Social engineering attacks prevention: A systematic literature review

W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …

Detecting social bots on twitter: a literature review

E Alothali, N Zaki, EA Mohamed… - … on innovations in …, 2018 - ieeexplore.ieee.org
Due to the exponential growth in the popularity of online social networks (OSNs), such as
Twitter and Facebook, the number of machine accounts that are designed to mimic human …

Hierarchical fixed priority pre-emptive scheduling

RI Davis, A Burns - 26th IEEE International Real-Time Systems …, 2005 - ieeexplore.ieee.org
This paper focuses on the hierarchical scheduling of systems where a number of separate
applications reside on a single processor. It addresses the particular case where fixed …

CHAT-Bot: A cultural heritage aware teller-bot for supporting touristic experiences

M Casillo, F Clarizia, G D'Aniello, M De Santo… - Pattern Recognition …, 2020 - Elsevier
Cultural heritage is an important resource that allows us to know and promote a territory. In
this respect, it is important to experiment with the enhancement of cultural heritage by …

A survey of big data dimensions vs social networks analysis

M Ianni, E Masciari, G Sperlí - Journal of Intelligent Information Systems, 2021 - Springer
The pervasive diffusion of Social Networks (SN) produced an unprecedented amount of
heterogeneous data. Thus, traditional approaches quickly became unpractical for real life …

Bot2Vec: A general approach of intra-community oriented representation learning for bot detection in different types of social networks

P Pham, LTT Nguyen, B Vo, U Yun - Information Systems, 2022 - Elsevier
Recently, due to the rapid growth of online social networks (OSNs) such as Facebook,
Twitter, Weibo, etc. the number of machine accounts/social bots that mimic human users has …

Digital forensics supported by machine learning for the detection of online sexual predatory chats

CH Ngejane, JHP Eloff, TJ Sefara… - Forensic science …, 2021 - Elsevier
Chat-logs are informative digital footprints available on Social Media Platforms (SMPs). With
the rise of cybercrimes targeting children, chat-logs can be used to discover and flag harmful …

[PDF][PDF] Desafíos nacionales frente a la ciberseguridad en el escenario global: un análisis para Colombia

MO Díaz, PES Rangel - Revista criminalidad, 2020 - revistacriminalidad.policia.gov.co
En este artículo se aborda el tema de la seguridad de la información frente a amenazas
cibernéticas en un contexto global, haciendo una revisión de la situación actual en …

Analyse digital forensic evidences through a semantic-based methodology and NLP techniques

F Amato, G Cozzolino, V Moscato, F Moscato - Future Generation …, 2019 - Elsevier
The increasing adoption of digital technologies to manage and process information used in
everyday life, results in an increase in the demand for digital data analysis for investigative …

The impact of technology readiness on the big data adoption among UAE organisations

A Haddad, A Ameen, O Isaac, I Alrajawy… - … Analytics and Innovation …, 2020 - Springer
Big Data is an important player in offering a highly competitive advantage, specialty, in
contemporary organisations. The theory of technology readiness can be used for measuring …