A Multi-Faceted Approach to Trending Topic Attack Detection Using Semantic Similarity and Large-Scale Datasets
Twitter's widespread popularity has made it a prime target for malicious actors exploiting
trending hashtags to disseminate harmful content. This study marks the first systematic …
trending hashtags to disseminate harmful content. This study marks the first systematic …
Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network
Requirements specifications written in natural language enable us to understand a
program's intended functionality, which we can then translate into operational software. At …
program's intended functionality, which we can then translate into operational software. At …
Review Evaluation for Hotel Recommendation
YC Hsieh, LC Lu, YF Ku - Electronics, 2023 - mdpi.com
With the prevalence of backpacking and the convenience of using the Internet, many
travelers like sharing their experiences in online communities. The development of online …
travelers like sharing their experiences in online communities. The development of online …
Detection of phishing domain using logistic regression technique and feature extraction using bert classification model
Phishing attacks pose a severe danger to the security of cyberspace. Phishing is a sort of
fraud in which victims and businesses are deceived into clicking on malicious URLs and …
fraud in which victims and businesses are deceived into clicking on malicious URLs and …
Filtering and Detection of Real-Time Spam Mail Based on a Bayesian Approach in University Networks
With the advent of digital technologies as an integral part of today's everyday life, the risk of
information security breaches is increasing. Email spam, commonly known as junk email …
information security breaches is increasing. Email spam, commonly known as junk email …
Assessing Urdu Language Processing Tools via Statistical and Outlier Detection Methods on Urdu Tweets
Text pre-processing is a crucial step in Natural Language Processing (NLP) applications,
particularly for handling informal and noisy content on social media. Word-level tokenization …
particularly for handling informal and noisy content on social media. Word-level tokenization …
Automated Spam Detection Using ECSA-Based Feature Selection with BGRN Classifier in Soft Computing Applications
Soft computing techniques are widely used due to their robustness and tolerance for
imprecision and uncertainty. They are employed in various fields like control systems …
imprecision and uncertainty. They are employed in various fields like control systems …
Machine Learning Based Solutions for Detecting Social Media Spam and Phishing Incidents
A Al Shehhi - 2024 - search.proquest.com
The growing digital interactions across various social media platforms increases the risks of
phishing schemes and spam messages that compromise personal and organisational …
phishing schemes and spam messages that compromise personal and organisational …
[PDF][PDF] SPAM DETECTION IN ROMAN URDU REVIEWS USING SPAMMER BEHAVIOR FEATURES
Reviews have emerged recently as the most important basis on which it is decided whether
offered products and services are good or bad. Therefore, customer reviews concern sellers …
offered products and services are good or bad. Therefore, customer reviews concern sellers …