Comprehensive review of cybercrime detection techniques

WA Al-Khater, S Al-Maadeed, AA Ahmed… - IEEE …, 2020‏ - ieeexplore.ieee.org
Cybercrimes are cases of indictable offences and misdemeanors that involve computers or
communication tools as targets and commission instruments or are associated with the …

Cybercrime detection and prevention efforts in the last decade: an overview of the possibilities of machine learning models

PU Chinedu, W Nwankwo, FU Masajuwa, S Imoisi - Rigeo, 2021‏ - rigeo.org
According to a report titled “cyberwarfare in the c-suite” released on January 21 2021 by
Steve Morgan of the cybercrime magazine, cybercrime is projected to unleash global …

Deep learning-based sentiment analysis of Facebook data: The case of Turkish users

Ö Çoban, SA Özel, A İnan - The Computer Journal, 2021‏ - academic.oup.com
Sentiment analysis (SA) is an essential task for many domains where it is crucial to know
users' public opinion about events, products, brands, politicians and so on. Existing works …

Huri: Hybrid user risk identification in social networks

R Corizzo, G Pio, EP Barracchia, A Pellicani… - World Wide Web, 2023‏ - Springer
The massive adoption of social networks increased the need to analyze users' data and
interactions to detect and block the spread of propaganda and harassment behaviors, as …

SAIRUS: Spatially-aware identification of risky users in social networks

A Pellicani, G Pio, D Redavid, M Ceci - Information Fusion, 2023‏ - Elsevier
The massive spread of social networks provided a plethora of new possibilities to
communicate and interact worldwide. On the other hand, they introduced some negative …

An NLP‐Based Framework to Spot Extremist Networks in Social Media

A Zapata Rozo, D Díaz-López, J Pastor-Galindo… - …, 2024‏ - Wiley Online Library
Governments and law enforcement agencies (LEAs) are increasingly concerned about
growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism …

A study of radicalism contents detection in twitter: Insights from support vector machine technique

E Miranda, M Aryuni, Y Fernando… - 2020 International …, 2020‏ - ieeexplore.ieee.org
Social media has been widely used to target, coordinate, disseminate and embed radicalism
doctrine to the society. Radicalism gives destructive impacts to an attacked country and the …

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review.

AA Kazaure, MN Yusoff… - Journal of Information …, 2023‏ - search.ebscohost.com
Cybercrime is a significant threat to Internet users, involving crimes committed using
computers or computer networks. The landscape of cyberspace presents a complex terrain …

Navigating complexity: a comprehensive review of heterogeneous information networks and embedding techniques

K Ammar, W Inoubli, S Zghal, EM Nguifo - Knowledge and Information …, 2025‏ - Springer
The adoption of heterogeneous information networks (HINs) has gained popularity as a
means of modeling complex real-world systems with diverse interacting components …

An early warning detection system of terrorism in Indonesia from twitter contents using naive bayes algorithm

M Aryuni, E Miranda, Y Fernando… - 2020 International …, 2020‏ - ieeexplore.ieee.org
Aware on the benefits of social media as the networking platform, the extremist organization
is utilized social media to spread the ideology, recruit new member and guided a suicide …