3.8 Article

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

ASPA-MOSN: An Efficient User Authentication Scheme for Phishing Attack Detection in Mobile Online Social Networks

Munmun Bhattacharya et al.

Summary: This article introduces a user authentication scheme for mitigating phishing attacks in online social networks, called ASPA-mOSN. Through security analysis and comparison with other schemes, this scheme performs well in terms of security and performance.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Artificial Intelligence

Mc-DNN: Fake News Detection Using Multi-Channel Deep Neural Networks

Jitendra Vikram Tembhurne et al.

Summary: With the advancement of technology, social media has become a major source of digital news, leading to an increase in spreading fake news. Researchers propose a multi-channel deep learning model, Mc-DNN, to differentiate fake news by processing news headlines and articles.

INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS (2022)

Article Computer Science, Information Systems

Machine Learning-Based Secure Data Acquisition for Fake Accounts Detection in Future Mobile Communication Networks

B. Prabhu Kavin et al.

Summary: Social media websites are popular on the Internet, but they also attract hackers to abuse data. This paper proposes an artificial intelligence technique for identifying spam on Twitter social media and demonstrates the effectiveness of the support vector machine algorithm in this context.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks

Gordhan Jethava et al.

Summary: The immense popularity of social networks has made them susceptible to security threats, including Sybil attacks. To detect such attacks, measuring the relationship strength between users is important. This study proposes a hybrid approach combining behavior-based and graph-based methods to detect Sybil attacks in online social networks. Experimental results validate the effectiveness of the proposed scheme.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Information Systems

GraphXSS: An efficient XSS payload detection approach based on graph convolutional network

Zhonglin Liu et al.

Summary: With the rapid development of the Internet age, web applications have become common and a target for hackers. This study proposed a cross-site scripting payload detection model based on graph convolutional networks, which effectively identifies cross-site scripting in user-submitted content and performs well in experiments.

COMPUTERS & SECURITY (2022)

Article Computer Science, Artificial Intelligence

A quantitative argumentation-based Automated eXplainable Decision System for fake news detection on social media

Haixiao Chi et al.

Summary: This study proposes a Quantitative Argumentation-based Automated eXplainable Decision-making System (QA-AXDS) to detect and explain fake news on social media. The system is fully data-driven, acquiring knowledge automatically and interacting with users to provide explanations and understanding of the reasoning process.

KNOWLEDGE-BASED SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Stratified hyperparameters optimization of feed-forward neural network for social network spam detection (SON2S)

E. Elakkiya et al.

Summary: In the past decade, the popularity and fascination for social networks have grown exponentially, leading to cybercriminals exploiting social networks for malicious activities such as spam. This research proposes the use of a feed-forward neural network for spam detection, utilizing a reinforcement learning and shuffled frog leaping algorithm to optimize the neural network parameters. Experimental results show that the proposed algorithm achieves higher accuracy and lower false positive rate compared to existing techniques.

SOFT COMPUTING (2022)

Review Psychiatry

Detecting and Measuring Depression on Social Media Using a Machine Learning Approach: Systematic Review

Danxia Liu et al.

Summary: This systematic review summarizes previous studies on applying machine learning methods to detect depressive symptoms from text data on social media. The review suggests directions for future research in this area and concludes that machine learning approaches can effectively contribute to depression detection and serve as complementary tools in public mental health practice.

JMIR MENTAL HEALTH (2022)

Article Business

Developing a mental health index using a machine learning approach: Assessing the impact of mobility and lockdown during the COVID-19

Krishnadas Nanath et al.

Summary: This study developed a mental health index based on the analysis of over three million global tweets and investigated the impact of lockdowns and mobility restrictions on mental health. The findings suggest that reduced workplace mobility, reduced retail and recreational mobility, and increased residential mobility have harmed mental health.

TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE (2022)

Article Computer Science, Information Systems

UCred: fusion of machine learning and deep learning methods for user credibility on social media

Pawan Kumar Verma et al.

Summary: This paper discusses the issue of real and fake user accounts in Online Social Networks (OSN) and proposes a UCred model for classifying user accounts. By combining the results of multiple techniques and using a voting classifier, the accuracy of user account classification is improved, surpassing the state-of-the-art model.

SOCIAL NETWORK ANALYSIS AND MINING (2022)

Article Computer Science, Interdisciplinary Applications

Detection and prevention of man-in-the-middle attack in iot network using regression modeling

N. Sivasankari et al.

Summary: This paper discusses the security concerns in IoT applications and proposes a regression modeling technique to detect and mitigate man-in-the-middle attacks, ensuring secure data transmission.

ADVANCES IN ENGINEERING SOFTWARE (2022)

Article Computer Science, Artificial Intelligence

SybilHunter: Hybrid graph-based sybil detection by aggregating user behaviors

Jian Mao et al.

Summary: This paper proposes SybilHunter, a hybrid graph-based sybil detection approach, which improves the structure of online social networks by aggregating user social behavior patterns. It quantifies nodes' similarity based on dynamic user behavior features to evaluate the trustworthiness and consistency of user pairs. By constructing a weighted-strong-social graph, SybilHunter outputs sybil nodes and achieves higher performance compared to typical graph-based sybil detection methods.

NEUROCOMPUTING (2022)

Proceedings Paper Computer Science, Cybernetics

Divide-and-Conquer: Post-User Interaction Network for Fake News Detection on Social Media

Erxue Min et al.

Summary: Fake news detection has attracted much attention recently, and social context based detection methods utilize the collective wisdom from users on social media to model the spreading patterns of fake news. To address the existing challenges, researchers propose a fake news detection model called Post-User Interaction Network (PSIN), which effectively models the interactions in social context while maintaining their characteristics. Additionally, an adversarial topic discriminator is adopted for topic-agnostic feature learning, and a new dataset for fake news detection is curated.

PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22) (2022)

Proceedings Paper Computer Science, Cybernetics

Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning

Soyoung Lee et al.

Summary: In this study, a novel method using reinforcement learning is proposed to automatically find reflected XSS vulnerabilities in black-box environments. Experimental results demonstrate that the method outperforms existing web scanners in various tests and can be applied in real-world scenarios.

PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

An Analysis of Cyber Espionage Process

Richard Rivera et al.

Summary: This paper presents a general scheme of cyber espionage process based on a literature review of remarkable cases and malware report analysis. The model covers all phases used by cyber espionage, including technical and human aspects, allowing attackers to use social engineering effectively for systems intruding.

DEVELOPMENTS AND ADVANCES IN DEFENSE AND SECURITY, MICRADS 2021 (2022)

Proceedings Paper Materials Science, Multidisciplinary

Fake news detection on social networks using Machine learning techniques

M. Senthil Raja et al.

Summary: The constant circulation of fake news has a negative impact on society. Insufficient authentication systems in online social networks lead to information abuse and identity cloning. This study investigates the application of machine learning techniques in detecting fake news and proposes an effective strategy with high accuracy and precision.

MATERIALS TODAY-PROCEEDINGS (2022)

Article Computer Science, Information Systems

A Hybrid Linguistic and Knowledge-Based Analysis Approach for Fake News Detection on Social Media

Noureddine Seddari et al.

Summary: The rapid development of social media and content-sharing platforms has led to the spread of misinformation and fake news, influencing public opinion and causing panic. This paper proposes a hybrid fake news detection system that combines linguistic and knowledge-based approaches, achieving better accuracy compared to existing methods.

IEEE ACCESS (2022)

Article Telecommunications

Understanding cyberbullying as an information security attack-life cycle modeling

Patricio Zambrano et al.

Summary: With the increasing prevalence of cyberbullying cases due to free access to technological resources, research related to this phenomenon from the fields of computer science and computer security remains limited. Lack of interest from researchers in the information security field may be due to factors such as limited access to specific databases, lack of unified scientific criteria, and absence of practical proposals. This study proposes a cyberbullying life cycle model through topic modeling and consideration of criteria associated with computer attacks, supported by a review of specific literature and knowledge bases gained from victims of online harassment and attackers' tweets.

ANNALS OF TELECOMMUNICATIONS (2021)

Review Computer Science, Artificial Intelligence

Online social networks security and privacy: comprehensive review and analysis

Ankit Kumar Jain et al.

Summary: With the rapid development of technology, online social networks have become increasingly popular. The fast spread of information shared on OSNs attracts attackers. Ensuring the secrecy and security of OSNs is crucial, especially concerning the privacy issues of user-shared personal information.

COMPLEX & INTELLIGENT SYSTEMS (2021)

Article Geography

A privacy-preserving framework for location recommendation using decentralized collaborative machine learning

Jinmeng Rao et al.

Summary: The study introduces a privacy-preserving location recommendation framework based on federated learning, which keeps user data private by storing it on their devices and aggregates local model parameters securely through multiple-party computation. The framework also integrates transportation infrastructure, place safety, and flow-based spatial interaction information to improve recommendation accuracy.

TRANSACTIONS IN GIS (2021)

Article Computer Science, Artificial Intelligence

Multiple features based approach for automatic fake news detection on social networks using deep learning

Somya Ranjan Sahoo et al.

Summary: In recent years, the proliferation of fake news on online social networks has become a serious issue, prompting the need for improved detection and prevention methods. This paper introduces an automatic fake news detection approach based on user profile information and deep learning, which has shown to increase detection accuracy.

APPLIED SOFT COMPUTING (2021)

Article Green & Sustainable Science & Technology

Real-Time DDoS Attack Detection System Using Big Data Approach

Mazhar Javed Awan et al.

Summary: The prevalence of DDoS attacks poses challenges in detection and mitigation. This study utilizes machine learning models to predict application layer DDoS attacks in real-time, minimizing prediction time with big data approaches and achieving a 99.5% accuracy rate.

SUSTAINABILITY (2021)

Article Chemistry, Multidisciplinary

Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection

Daniyal Alghazzawi et al.

Summary: DDoS attacks pose a serious risk to computer networks and systems, but using machine learning/deep learning for detection can be helpful. Existing research has utilized ML classifiers and conventional methods to predict DDoS attacks, but accuracy remains a challenge.

APPLIED SCIENCES-BASEL (2021)

Review Health Care Sciences & Services

Machine Learning and Natural Language Processing in Mental Health: Systematic Review

Aziliz Le Glaz et al.

Summary: This systematic review focuses on the application of machine learning and NLP techniques in the field of mental health. The study aims to summarize and characterize studies in methodological and technical terms, and consider the potential use of these methods in mental health clinical practice. The findings show that machine learning and NLP methods can extract symptoms, classify severity of illness, compare therapy effectiveness, and provide psychopathological clues in mental health research.

JOURNAL OF MEDICAL INTERNET RESEARCH (2021)

Article

XSS attack prevention using machine learning

Kanav Raj Farishta et al.

World Review of Science, Technology and Sustainable Development (2021)

Article Computer Science, Information Systems

IS HIDDEN SAFE? LOCATION PROTECTION AGAINST MACHINE-LEARNING PREDICTION ATTACKS IN SOCIAL NETWORKS

Xiao Han et al.

Summary: User privacy protection is a critical concern for online social networks, as adversaries may use advanced machine learning techniques to predict hidden information. This study proposes a solution to estimate and manage the exposure risk of users’ hidden information by simulating prediction attacks and constructing an exposure risk estimator. The proposed estimator not only informs users of exposure risks related to their hidden information but also helps them mitigate these risks by selecting appropriate countermeasures.

MIS QUARTERLY (2021)

Article Computer Science, Artificial Intelligence

Recurrent Neural Network (RNN) to Analyse Mental Behaviour in Social Media

Hadj Ahmed Bouarara

Summary: A recent British study found that social media has a negative impact on mental health in people aged 14 to 35. The study utilized a recurrent neural network (RNN) to analyze tweets and help detect and prevent mental health problems, achieving an accuracy rate of 85%, outperforming other techniques.

INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI (2021)

Article Computer Science, Information Systems

Cost-Based Heterogeneous Learning Framework for Real-Time Spam Detection in Social Networks With Expert Decisions

Jaeun Choi et al.

Summary: This paper presents a spam-detection framework that combines the advantages of experts and machine learning, resulting in a higher detection rate. The framework uses a primary machine learning filter to analyze messages first and then involves experts in analyzing suspicious messages to further improve accuracy.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Online Social Deception and Its Countermeasures: A Survey

Zhen Guo et al.

Summary: This paper discusses the current status and threats of online social deception from multiple perspectives, and proposes effective countermeasures. Understanding the concept of social deception, various types of attacks, defense mechanisms, validation data, and legal and ethical issues related to research is crucial.

IEEE ACCESS (2021)

Article Mathematics, Applied

Multi-contextual spammer detection for online social networks

Avneet Kaur et al.

Summary: The prevalent usage of online social platforms has revolutionized information exchange, but user profiles are vulnerable to spam attacks. A model based on real-time tweets has been proposed to detect spammers, incorporating social network and content features, and utilizing machine learning algorithms for performance evaluation.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY (2021)

Article Computer Science, Information Systems

Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection

Somya Ranjan Sahoo et al.

ENTERPRISE INFORMATION SYSTEMS (2020)

Article Computer Science, Artificial Intelligence

A Status Property Classifier of Social Media User's Personality for Customer-Oriented Intelligent Marketing Systems: Intelligent-Based Marketing Activities

Tsung-Yi Chen et al.

INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS (2020)

Article Computer Science, Information Systems

LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks

Pallavi Kaliyar et al.

COMPUTERS & SECURITY (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

The Detecting Cross-Site Scripting (XSS) Using Machine Learning Methods

Stanislav Kascheev et al.

2020 GLOBAL SMART INDUSTRY CONFERENCE (GLOSIC) (2020)

Article Computer Science, Information Systems

A Privacy-Preserving Efficient Location-Sharing Scheme for Mobile Online Social Network Applications

Munmun Bhattacharya et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

An Efficient Victim Prediction for Sybil Detection in Online Social Network

Qingqing Zhou et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Content-Based Method for Sybil Detection in Online Social Networks via Deep Learning

Tianyu Gao et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Heuristic nonlinear regression strategy for detecting phishing websites

Mehdi Babagoli et al.

SOFT COMPUTING (2019)

Article Computer Science, Artificial Intelligence

A machine learning based approach for phishing detection using hyperlinks information

Ankit Kumar Jain et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Computer Science, Information Systems

Analytical Model for Sybil Attack Phases in Internet of Things

Alekha Kumar Mishra et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Classification of various attacks and their defence mechanism in online social networks: a survey

Somya Ranjan Sahoo et al.

ENTERPRISE INFORMATION SYSTEMS (2019)

Article Computer Science, Information Systems

A new hybrid ensemble feature selection framework for machine learning-based phishing detection system

Kang Leng Chiew et al.

INFORMATION SCIENCES (2019)

Review Computer Science, Artificial Intelligence

A comprehensive survey of edge prediction in social networks: Techniques, parameters and challenges

Babita Pandey et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Article Mathematics, Interdisciplinary Applications

Deep Learning Method for Prediction of DDoS Attacks on Social Media

Rasim M. Alguliyev et al.

ADVANCES IN DATA SCIENCE AND ADAPTIVE ANALYSIS (2019)

Article Computer Science, Information Systems

IoMT Malware Detection Approaches: Analysis and Research Challenges

Mohammad Wazid et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique

Fawaz Mahiuob Mohammed Mokbal et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Fake profile detection techniques in large-scale online social networks: A comprehensive review

Devakunchari Ramalingam et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Artificial Intelligence

Detection of online phishing email using dynamic evolving neural network based on reinforcement learning

Sami Smadi et al.

DECISION SUPPORT SYSTEMS (2018)

Article Computer Science, Theory & Methods

Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network

Shashank Gupta et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A prediction system of Sybil attack in social network using deep-regression model

Muhammad Al-Qurishi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A Sybil attack detection scheme for a forest wildfire monitoring application

Mian Ahmad Jan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense

Huaxin Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Cybernetics

The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context

Jing Chen et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2018)

Review Computer Science, Hardware & Architecture

A survey of detection methods for XSS attacks

Upasana Sarmah et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Review Computer Science, Hardware & Architecture

Influence analysis in social networks: A survey

Sancheng Peng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

Understanding structure-based social network de-anonymization techniques via empirical analysis

Jian Mao et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2018)

Article Engineering, Electrical & Electronic

DeepScan: Exploiting Deep Learning Malicious Account Detection in Location-Based Social Networks

Qingyuan Gong et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Proceedings Paper Computer Science, Artificial Intelligence

EANN: Event Adversarial Neural Networks for Multi-Modal Fake News Detection

Yaqing Wang et al.

KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING (2018)

Article Computer Science, Information Systems

Privacy and Security Issues in Online Social Networks

Shaukat Ali et al.

FUTURE INTERNET (2018)

Article Computer Science, Cybernetics

A Neural Network-Based Ensemble Approach for Spam Detection in Twitter

Sreekanth Madisetty et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2018)

Article Computer Science, Information Systems

Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey

Mohamed Amine Ferrag et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Hardware & Architecture

Towards Detecting Compromised Accounts on Social Networks

Manuel Egele et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)

Article Computer Science, Theory & Methods

Statistical Features-Based Real-Time Detection of Drifted Twitter Spam

Chao Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Social network security: Issues, challenges, threats, and solutions

Shailendra Rathore et al.

INFORMATION SCIENCES (2017)

Review Health Care Sciences & Services

Researching Mental Health Disorders in the Era of Social Media: Systematic Review

Akkapon Wongkoblap et al.

JOURNAL OF MEDICAL INTERNET RESEARCH (2017)

Proceedings Paper Computer Science, Information Systems

Adversarial Examples for Malware Detection

Kathrin Grosse et al.

COMPUTER SECURITY - ESORICS 2017, PT II (2017)

Article Computer Science, Information Systems

Privacy-driven access control in social networks by means of automatic semantic annotation

Malik Imran-Daud et al.

COMPUTER COMMUNICATIONS (2016)

Article Computer Science, Artificial Intelligence

PhishWHO: Phishing webpage detection via identity keywords extraction and target domain name finder

Choon Lin Tan et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Information Systems

A Survey of Man In The Middle Attacks

Mauro Conti et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Hardware & Architecture

MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks

Rong Yu et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Article Computer Science, Information Systems

A three-way decision making approach to malware analysis using probabilistic rough sets

Mohammad Nauman et al.

INFORMATION SCIENCES (2016)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Telecommunications

An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks

Mohammad Wazid et al.

WIRELESS PERSONAL COMMUNICATIONS (2016)

Article Computer Science, Information Systems

A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card

Dheerendra Mishra et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking

Xue Yang et al.

BIG DATA RESEARCH (2016)

Editorial Material Communication

Social media definition and the governance challenge: An introduction to the special issue

Jonathan A. Obar et al.

TELECOMMUNICATIONS POLICY (2015)

Article Computer Science, Information Systems

An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

Santanu Chatterjee et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Proceedings Paper Computer Science, Information Systems

Gray and Black Hole Attack Identification using Control Packets in MANETs

Arvind Dhaka et al.

ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015 (2015)

Article Computer Science, Information Systems

Advanced social engineering attacks

Katharina Krombholz et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2015)

Article Computer Science, Cybernetics

A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection

Chao Chen et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2015)

Article Computer Science, Artificial Intelligence

A defence scheme against Identity Theft Attack based on multiple social networks

Bing-Zhe He et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Theory & Methods

SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection

Neil Zhenqiang Gong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Information Systems

PSD: Practical Sybil detection schemes using stickiness and persistence in online recommender systems

Giseop Noh et al.

INFORMATION SCIENCES (2014)

Article Psychology, Social

Cyberstalking in a Large Sample of Social Network Users: Prevalence, Characteristics, and Impact Upon Victims

Harald Dressing et al.

CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING (2014)

Article Computer Science, Hardware & Architecture

Design and analysis of a social botnet

Yazan Boshmaf et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Artificial Intelligence

Detecting malicious tweets in trending topics using a statistical analysis of language

Juan Martinez-Romo et al.

EXPERT SYSTEMS WITH APPLICATIONS (2013)

Article Computer Science, Information Systems

A Social Semantic Web Access Control Model

Serena Villata et al.

JOURNAL ON DATA SEMANTICS (2013)

Article Computer Science, Information Systems

A trust model for multimedia social networks

Zhiyong Zhang et al.

SOCIAL NETWORK ANALYSIS AND MINING (2013)

Article Industrial Relations & Labor

To Screen or Not to Screen? Using the Internet for Selection Decisions

H. Kristl Davison et al.

EMPLOYEE RESPONSIBILITIES AND RIGHTS JOURNAL (2012)

Article Computer Science, Information Systems

CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites

Guang Xiang et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2011)

Editorial Material Psychology, Biological

Evolutionary explanations need to account for cultural variation

Steven J. Heine

BEHAVIORAL AND BRAIN SCIENCES (2011)

Article Humanities, Multidisciplinary

A Contextual Approach to Privacy Online

Helen Nissenbaum

DAEDALUS (2011)

Article Business

Users of the world, unite! The challenges and opportunities of Social Media

Andreas M. Kaplan et al.

BUSINESS HORIZONS (2010)

Article Engineering, Electrical & Electronic

Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust

Leucio Antonio Cutillo et al.

IEEE COMMUNICATIONS MAGAZINE (2009)

Proceedings Paper Computer Science, Hardware & Architecture

Prying Data out of a Social Network

Joseph Bonneau et al.

2009 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (2009)

Article Psychology, Multidisciplinary

Cross-cultural deception in social networking sites and face-to-face communication

Carmen C. Lewis et al.

COMPUTERS IN HUMAN BEHAVIOR (2008)

Article Computer Science, Information Systems

Resisting Structural Re-identification in Anonymized Social Networks

Michael Hay et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2008)

Article Communication

Social Network Sites: Definition, History, and Scholarship

Danah M. Boyd et al.

JOURNAL OF COMPUTER-MEDIATED COMMUNICATION (2007)

Article Computer Science, Information Systems

The link-prediction problem for social networks

David Liben-Nowell et al.

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY (2007)