Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
Ransomware is a malware category that exploits security mechanisms such as cryptography
in order to hijack user files and related resources and demands money in exchange for the …
in order to hijack user files and related resources and demands money in exchange for the …
Academic social networks: Modeling, analysis, mining and applications
In the fast-growing scholarly big data background, social network technologies have recently
aroused widespread attention in academia and industry. The concept of academic social …
aroused widespread attention in academia and industry. The concept of academic social …
MalBoT-DRL: Malware botnet detection using deep reinforcement learning in IoT networks
In the dynamic landscape of cyber threats, multistage malware botnets have surfaced as
significant threats of concern. These sophisticated threats can exploit Internet of Things (IoT) …
significant threats of concern. These sophisticated threats can exploit Internet of Things (IoT) …
A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
[HTML][HTML] An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks
Due to its importance in several applications, including fraud and spammer detection,
anomaly detection has emerged as a key challenge in social network analysis in recent …
anomaly detection has emerged as a key challenge in social network analysis in recent …
A survey on the development status and application prospects of knowledge graph in smart grids
With the advent of the electric power big data era, semantic interoperability and
interconnection of power data have received extensive attention. Knowledge graph …
interconnection of power data have received extensive attention. Knowledge graph …
Detecting fake accounts on social media
S Khaled, N El-Tazi… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
In the present generation, on-Line social networks (OSNs) have become increasingly
popular, people's social lives have become more associated with these sites. They use on …
popular, people's social lives have become more associated with these sites. They use on …
Detection of malicious social bots: A survey and a refined taxonomy
M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …
Anomaly detection methods for categorical data: A review
Anomaly detection has numerous applications in diverse fields. For example, it has been
widely used for discovering network intrusions and malicious events. It has also been used …
widely used for discovering network intrusions and malicious events. It has also been used …
Multivariate weather anomaly detection using DBSCAN clustering algorithm
Weather is highly influential for human life. Weather anomalies describe conditions that are
out of the ordinary and need special attention because they can affect various aspects of …
out of the ordinary and need special attention because they can affect various aspects of …