A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023‏ - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

A real-time deep-learning approach for filtering Arabic low-quality content and accounts on Twitter

R Alharthi, A Alhothali, K Moria - Information Systems, 2021‏ - Elsevier
Social networks have generated immense amounts of data that have been successfully
utilized for research and business purposes. The approachability and immediacy of social …

Who's calling? characterizing robocalls through audio and metadata analysis

S Prasad, E Bouma-Sims, AK Mylappan… - 29th USENIX Security …, 2020‏ - usenix.org
Unsolicited calls are one of the most prominent security issues facing individuals today.
Despite wide-spread anecdotal discussion of the problem, many important questions remain …

Recent trends in social engineering scams and case study of gift card scam

R Chaganti, B Bhushan, A Nayyar… - arxiv preprint arxiv …, 2021‏ - arxiv.org
Social engineering scams (SES) has been existed since the adoption of the
telecommunications by humankind. An earlier version of the scams include leveraging …

Detecting and characterizing arab spammers campaigns in twitter

R Alharthi, A Alhothali, K Moria - Procedia Computer Science, 2019‏ - Elsevier
Social media platforms play a significant role in today's society as billions of users use them
to share or seek information on a regular basis. The content in social media has a significant …

An empirical analysis of health-related campaigns on Twitter Arabic hashtags

NH Imam, VG Vassilakis… - 2022 7th International …, 2022‏ - ieeexplore.ieee.org
Twitter trending hashtags are a primary feature, where users regularly visit to get news or
chat with each other. However, this valuable feature has been abused by malicious …

Diving into Robocall Content with {SnorCall}

S Prasad, T Dunlap, A Ross, B Reaves - 32nd USENIX Security …, 2023‏ - usenix.org
Unsolicited bulk telephone calls—termed" robocalls"—nearly outnumber legitimate calls,
overwhelming telephone users. While the vast majority of these calls are illegal, they are …

A study on characterizing the ecosystem of monetizing video spams on youtube platform

A Tripathi, KK Bharti, M Ghosh - … of the 21st International Conference on …, 2019‏ - dl.acm.org
In this work, we specifically study YouTube videos promoting easy money gaining tricks. We
observe a noticeable presence of such videos on YouTube that are being used to-1) …

Theorizing communicative styles on social media: an etymological shift

CR Ramachandiran, MM Mahmud - Journal of physics …, 2019‏ - iopscience.iop.org
Distinct polarities of gender stereotypes ascertain that communicative styles demonstrated
by men and women are fundamentally disparate. Numerous researches have established …

A Comprehensive Study to Detect Social Spam Campaigns

D Dhaka, M Mehrotra - Advanced Applications of NLP and Deep …, 2023‏ - igi-global.com
Social media is a widespread source of diverse forms of data. Information is diffusing so fast
that any fascinating news is so rapidly spread through social media that it can be accessed …