Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

BAS Al-Rimy, MA Maarof, SZM Shaid - Computers & Security, 2018 - Elsevier
Ransomware is a malware category that exploits security mechanisms such as cryptography
in order to hijack user files and related resources and demands money in exchange for the …

Academic social networks: Modeling, analysis, mining and applications

X Kong, Y Shi, S Yu, J Liu, F **a - Journal of Network and Computer …, 2019 - Elsevier
In the fast-growing scholarly big data background, social network technologies have recently
aroused widespread attention in academia and industry. The concept of academic social …

MalBoT-DRL: Malware botnet detection using deep reinforcement learning in IoT networks

M Al-Fawa'reh, J Abu-Khalaf… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the dynamic landscape of cyber threats, multistage malware botnets have surfaced as
significant threats of concern. These sophisticated threats can exploit Internet of Things (IoT) …

A new direction in social network analysis: Online social network analysis problems and applications

U Can, B Alatas - Physica A: Statistical Mechanics and its Applications, 2019 - Elsevier
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …

[HTML][HTML] An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks

W Khan, M Haroon - International Journal of Cognitive Computing in …, 2022 - Elsevier
Due to its importance in several applications, including fraud and spammer detection,
anomaly detection has emerged as a key challenge in social network analysis in recent …

A survey on the development status and application prospects of knowledge graph in smart grids

J Wang, X Wang, C Ma, L Kou - IET Generation, Transmission …, 2021 - Wiley Online Library
With the advent of the electric power big data era, semantic interoperability and
interconnection of power data have received extensive attention. Knowledge graph …

Detecting fake accounts on social media

S Khaled, N El-Tazi… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
In the present generation, on-Line social networks (OSNs) have become increasingly
popular, people's social lives have become more associated with these sites. They use on …

Detection of malicious social bots: A survey and a refined taxonomy

M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …

Anomaly detection methods for categorical data: A review

A Taha, AS Hadi - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Anomaly detection has numerous applications in diverse fields. For example, it has been
widely used for discovering network intrusions and malicious events. It has also been used …

Multivariate weather anomaly detection using DBSCAN clustering algorithm

S Wibisono, MT Anwar, A Supriyanto… - Journal of Physics …, 2021 - iopscience.iop.org
Weather is highly influential for human life. Weather anomalies describe conditions that are
out of the ordinary and need special attention because they can affect various aspects of …