相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks
Munmun Bhattacharya et al.
IEEE SYSTEMS JOURNAL (2023)
Mc-DNN: Fake News Detection Using Multi-Channel Deep Neural Networks
Jitendra Vikram Tembhurne et al.
INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS (2022)
Machine Learning-Based Secure Data Acquisition for Fake Accounts Detection in Future Mobile Communication Networks
B. Prabhu Kavin et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)
User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks
Gordhan Jethava et al.
COMPUTERS & ELECTRICAL ENGINEERING (2022)
GraphXSS: An efficient XSS payload detection approach based on graph convolutional network
Zhonglin Liu et al.
COMPUTERS & SECURITY (2022)
A quantitative argumentation-based Automated eXplainable Decision System for fake news detection on social media
Haixiao Chi et al.
KNOWLEDGE-BASED SYSTEMS (2022)
Stratified hyperparameters optimization of feed-forward neural network for social network spam detection (SON2S)
E. Elakkiya et al.
SOFT COMPUTING (2022)
Detecting and Measuring Depression on Social Media Using a Machine Learning Approach: Systematic Review
Danxia Liu et al.
JMIR MENTAL HEALTH (2022)
Developing a mental health index using a machine learning approach: Assessing the impact of mobility and lockdown during the COVID-19
Krishnadas Nanath et al.
TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE (2022)
UCred: fusion of machine learning and deep learning methods for user credibility on social media
Pawan Kumar Verma et al.
SOCIAL NETWORK ANALYSIS AND MINING (2022)
Detection and prevention of man-in-the-middle attack in iot network using regression modeling
N. Sivasankari et al.
ADVANCES IN ENGINEERING SOFTWARE (2022)
SybilHunter: Hybrid graph-based sybil detection by aggregating user behaviors
Jian Mao et al.
NEUROCOMPUTING (2022)
Divide-and-Conquer: Post-User Interaction Network for Fake News Detection on Social Media
Erxue Min et al.
PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22) (2022)
Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning
Soyoung Lee et al.
PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22) (2022)
An Analysis of Cyber Espionage Process
Richard Rivera et al.
DEVELOPMENTS AND ADVANCES IN DEFENSE AND SECURITY, MICRADS 2021 (2022)
Fake news detection on social networks using Machine learning techniques
M. Senthil Raja et al.
MATERIALS TODAY-PROCEEDINGS (2022)
A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media
Noureddine Seddari et al.
IEEE ACCESS (2022)
Understanding cyberbullying as an information security attack-life cycle modeling
Patricio Zambrano et al.
ANNALS OF TELECOMMUNICATIONS (2021)
Online social networks security and privacy: comprehensive review and analysis
Ankit Kumar Jain et al.
COMPLEX & INTELLIGENT SYSTEMS (2021)
A privacy-preserving framework for location recommendation using decentralized collaborative machine learning
Jinmeng Rao et al.
TRANSACTIONS IN GIS (2021)
Multiple features based approach for automatic fake news detection on social networks using deep learning
Somya Ranjan Sahoo et al.
APPLIED SOFT COMPUTING (2021)
Real-Time DDoS Attack Detection System Using Big Data Approach
Mazhar Javed Awan et al.
SUSTAINABILITY (2021)
Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection
Daniyal Alghazzawi et al.
APPLIED SCIENCES-BASEL (2021)
Machine Learning and Natural Language Processing in Mental Health: Systematic Review
Aziliz Le Glaz et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2021)
XSS attack prevention using machine learning
Kanav Raj Farishta et al.
World Review of Science, Technology and Sustainable Development (2021)
IS HIDDEN SAFE? LOCATION PROTECTION AGAINST MACHINE-LEARNING PREDICTION ATTACKS IN SOCIAL NETWORKS
Xiao Han et al.
MIS QUARTERLY (2021)
Recurrent Neural Network (RNN) to Analyse Mental Behaviour in Social Media
Hadj Ahmed Bouarara
INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI (2021)
Cost-Based Heterogeneous Learning Framework for Real-Time Spam Detection in Social Networks With Expert Decisions
Jaeun Choi et al.
IEEE ACCESS (2021)
Online Social Deception and Its Countermeasures: A Survey
Zhen Guo et al.
IEEE ACCESS (2021)
Multi-contextual spammer detection for online social networks
Avneet Kaur et al.
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2021)
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
Somya Ranjan Sahoo et al.
ENTERPRISE INFORMATION SYSTEMS (2020)
A Status Property Classifier of Social Media User's Personality for Customer-Oriented Intelligent Marketing Systems: Intelligent-Based Marketing Activities
Tsung-Yi Chen et al.
INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS (2020)
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks
Pallavi Kaliyar et al.
COMPUTERS & SECURITY (2020)
The Detecting Cross-Site Scripting (XSS) Using Machine Learning Methods
Stanislav Kascheev et al.
2020 GLOBAL SMART INDUSTRY CONFERENCE (GLOSIC) (2020)
A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications
Munmun Bhattacharya et al.
IEEE ACCESS (2020)
An Efficient Victim Prediction for Sybil Detection in Online Social Network
Qingqing Zhou et al.
IEEE ACCESS (2020)
A Content-Based Method for Sybil Detection in Online Social Networks via Deep Learning
Tianyu Gao et al.
IEEE ACCESS (2020)
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges
Sumit Pundir et al.
IEEE ACCESS (2020)
Heuristic nonlinear regression strategy for detecting phishing websites
Mehdi Babagoli et al.
SOFT COMPUTING (2019)
A machine learning based approach for phishing detection using hyperlinks information
Ankit Kumar Jain et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)
Analytical Model for Sybil Attack Phases in Internet of Things
Alekha Kumar Mishra et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Classification of various attacks and their defence mechanism in online social networks: a survey
Somya Ranjan Sahoo et al.
ENTERPRISE INFORMATION SYSTEMS (2019)
A new hybrid ensemble feature selection framework for machine learning-based phishing detection system
Kang Leng Chiew et al.
INFORMATION SCIENCES (2019)
A comprehensive survey of edge prediction in social networks: Techniques, parameters and challenges
Babita Pandey et al.
EXPERT SYSTEMS WITH APPLICATIONS (2019)
An intelligent system for spam detection and identification of the most relevant features based on evolutionary Random Weight Networks
Hossam Faris et al.
INFORMATION FUSION (2019)
Deep Learning Method for Prediction of DDoS Attacks on Social Media
Rasim M. Alguliyev et al.
ADVANCES IN DATA SCIENCE AND ADAPTIVE ANALYSIS (2019)
IoMT Malware Detection Approaches: Analysis and Research Challenges
Mohammad Wazid et al.
IEEE ACCESS (2019)
MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique
Fawaz Mahiuob Mohammed Mokbal et al.
IEEE ACCESS (2019)
Fake profile detection techniques in large-scale online social networks: A comprehensive review
Devakunchari Ramalingam et al.
COMPUTERS & ELECTRICAL ENGINEERING (2018)
Detection of online phishing email using dynamic evolving neural network based on reinforcement learning
Sami Smadi et al.
DECISION SUPPORT SYSTEMS (2018)
Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network
Shashank Gupta et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A prediction system of Sybil attack in social network using deep-regression model
Muhammad Al-Qurishi et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A Sybil attack detection scheme for a forest wildfire monitoring application
Mian Ahmad Jan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense
Huaxin Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context
Jing Chen et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2018)
A survey of detection methods for XSS attacks
Upasana Sarmah et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Influence analysis in social networks: A survey
Sancheng Peng et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Understanding structure-based social network de-anonymization techniques via empirical analysis
Jian Mao et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)
DeepScan: Exploiting Deep Learning Malicious Account Detection in Location-Based Social Networks
Qingyuan Gong et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
EANN: Event Adversarial Neural Networks for Multi-Modal Fake News Detection
Yaqing Wang et al.
KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING (2018)
Privacy and Security Issues in Online Social Networks
Shaukat Ali et al.
FUTURE INTERNET (2018)
A Neural Network-Based Ensemble Approach for Spam Detection in Twitter
Sreekanth Madisetty et al.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2018)
Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey
Mohamed Amine Ferrag et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Towards Detecting Compromised Accounts on Social Networks
Manuel Egele et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam
Chao Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Social network security: Issues, challenges, threats, and solutions
Shailendra Rathore et al.
INFORMATION SCIENCES (2017)
Researching Mental Health Disorders in the Era of Social Media: Systematic Review
Akkapon Wongkoblap et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2017)
Adversarial Examples for Malware Detection
Kathrin Grosse et al.
COMPUTER SECURITY - ESORICS 2017, PT II (2017)
Privacy-driven access control in social networks by means of automatic semantic annotation
Malik Imran-Daud et al.
COMPUTER COMMUNICATIONS (2016)
PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder
Choon Lin Tan et al.
DECISION SUPPORT SYSTEMS (2016)
A Survey of Man In The Middle Attacks
Mauro Conti et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks
Rong Yu et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)
A three-way decision making approach to malware analysis using probabilistic rough sets
Mohammad Nauman et al.
INFORMATION SCIENCES (2016)
A survey of network anomaly detection techniques
Mohiuddin Ahmed et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks
Mohammad Wazid et al.
WIRELESS PERSONAL COMMUNICATIONS (2016)
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card
Dheerendra Mishra et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)
SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking
Xue Yang et al.
BIG DATA RESEARCH (2016)
Social media definition and the governance challenge: An introduction to the special issue
Jonathan A. Obar et al.
TELECOMMUNICATIONS POLICY (2015)
An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks
Santanu Chatterjee et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
Gray and Black Hole Attack Identification using Control Packets in MANETs
Arvind Dhaka et al.
ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015 (2015)
Advanced social engineering attacks
Katharina Krombholz et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2015)
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection
Chao Chen et al.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2015)
A defence scheme against Identity Theft Attack based on multiple social networks
Bing-Zhe He et al.
EXPERT SYSTEMS WITH APPLICATIONS (2014)
SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection
Neil Zhenqiang Gong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
PSD: Practical Sybil detection schemes using stickiness and persistence in online recommender systems
Giseop Noh et al.
INFORMATION SCIENCES (2014)
Cyberstalking in a Large Sample of Social Network Users: Prevalence, Characteristics, and Impact Upon Victims
Harald Dressing et al.
CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2014)
Design and analysis of a social botnet
Yazan Boshmaf et al.
COMPUTER NETWORKS (2013)
Detecting malicious tweets in trending topics using a statistical analysis of language
Juan Martinez-Romo et al.
EXPERT SYSTEMS WITH APPLICATIONS (2013)
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
Ashok Kumar Das et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
A Social Semantic Web Access Control Model
Serena Villata et al.
JOURNAL ON DATA SEMANTICS (2013)
A trust model for multimedia social networks
Zhiyong Zhang et al.
SOCIAL NETWORK ANALYSIS AND MINING (2013)
To Screen or Not to Screen? Using the Internet for Selection Decisions
H. Kristl Davison et al.
EMPLOYEE RESPONSIBILITIES AND RIGHTS JOURNAL (2012)
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites
Guang Xiang et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2011)
Evolutionary explanations need to account for cultural variation
Steven J. Heine
BEHAVIORAL AND BRAIN SCIENCES (2011)
A Contextual Approach to Privacy Online
Helen Nissenbaum
DAEDALUS (2011)
Users of the world, unite! The challenges and opportunities of Social Media
Andreas M. Kaplan et al.
BUSINESS HORIZONS (2010)
Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust
Leucio Antonio Cutillo et al.
IEEE COMMUNICATIONS MAGAZINE (2009)
Prying Data out of a Social Network
Joseph Bonneau et al.
2009 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (2009)
Cross-cultural deception in social networking sites and face-to-face communication
Carmen C. Lewis et al.
COMPUTERS IN HUMAN BEHAVIOR (2008)
Resisting Structural Re-identification in Anonymized Social Networks
Michael Hay et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2008)
Social Network Sites: Definition, History, and Scholarship
Danah M. Boyd et al.
JOURNAL OF COMPUTER-MEDIATED COMMUNICATION (2007)
The link-prediction problem for social networks
David Liben-Nowell et al.
JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY (2007)