Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms
暂无分享,去创建一个
[1] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[2] A. K. Verma,et al. Classification of SQL Injection Attacks Using Fuzzy Tainting , 2018 .
[3] V. D. Sharma,et al. Social Media Ecosystem: Review on Social Media Profile’s Security and Introduce a New Approach , 2019 .
[4] Danai Koutra,et al. BotWalk: Efficient Adaptive Exploration of Twitter Bot Networks , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[5] Helena Rifà-Pous,et al. Privacy Analysis on Microblogging Online Social Networks , 2019, ACM Comput. Surv..
[6] Seyed Hossein Khasteh,et al. Automatic ICA detection in online social networks with PageRank , 2020, Peer-to-Peer Netw. Appl..
[7] Xin Wang,et al. DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks , 2018, IEEE Communications Magazine.
[8] Madhumita Chatterjee,et al. Taxonomy of Cyberbullying Detection and Prediction Techniques in Online Social Networks , 2020 .
[9] Roberto Di Pietro,et al. The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race , 2017, WWW.
[10] Martin C. Libicki. Drawing inferences from cyber espionage , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).
[11] Jun Zhang,et al. Twitter spam detection based on deep learning , 2017, ACSW.
[12] Jong Kim,et al. WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream , 2013, IEEE Transactions on Dependable and Secure Computing.
[13] Jenny Torres,et al. Cross-site scripting (XSS) attacks and mitigation: A survey , 2020, Comput. Networks.
[14] Bin Liu,et al. Attribute Inference Attacks in Online Social Networks , 2018, TOPS.
[15] Debdeep Mukhopadhyay,et al. RAPPER: Ransomware Prevention via Performance Counters , 2018, ArXiv.
[16] Athanasios V. Vasilakos,et al. Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues , 2018, Telecommun. Syst..
[17] Michele Colajanni,et al. On the effectiveness of machine and deep learning for cyber security , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).
[18] S. Vigneshwari,et al. An enhanced system to identify mischievous social malwares on Facebook applications , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).
[19] Pedro García-Teodoro,et al. R-Locker: Thwarting ransomware action through a honeyfile-based approach , 2018, Comput. Secur..
[20] Hilal Almarabeh,et al. THE IMPACT OF CYBER THREATS ON SOCIAL NETWORKING SITES , 2019, International Journal of Advanced Research in Computer Science.
[21] Sébastien Marcel,et al. DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.
[22] Maurizio Tesconi,et al. RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter , 2019, WebSci.
[23] Gang Wang,et al. Characterizing and detecting malicious crowdsourcing , 2013, SIGCOMM.
[24] Gianluca Stringhini,et al. From risk factors to detection and intervention: a practical proposal for future work on cyberbullying , 2018, Behav. Inf. Technol..
[25] Jinyuan Jia,et al. Random Walk Based Fake Account Detection in Online Social Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[26] Fabio Persia,et al. A Survey of Online Social Networks: Challenges and Opportunities , 2017, 2017 IEEE International Conference on Information Reuse and Integration (IRI).
[27] Michalis Faloutsos,et al. FRAppE: detecting malicious facebook applications , 2012, CoNEXT '12.
[28] Rohini Lokare,et al. FRAppE Detecting Malicious Facebook Applications , 2016 .
[29] Kristina Lerman,et al. RAPTOR: Ransomware Attack PredicTOR , 2018, ArXiv.
[30] Daniel Morato,et al. Open Repository for the Evaluation of Ransomware Detection Tools , 2020, IEEE Access.
[31] Emilio Ferrara,et al. The history of digital spam , 2019, Commun. ACM.
[32] C. D. Jaidhar,et al. Applicability of machine learning in spam and phishing email filtering: review and approaches , 2020, Artificial Intelligence Review.
[33] Yi Mu,et al. On the Design of a New Trust Model for Mobile Agent Security , 2004, TrustBus.
[34] Niki Pissinou,et al. Preventing Colluding Identity Clone Attacks in Online Social Networks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[35] K. R. Venugopal,et al. Spamming the mainstream: A survey on trending Twitter spam detection techniques , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).
[36] Ritesh Kumar,et al. Aggression-annotated Corpus of Hindi-English Code-mixed Data , 2018, LREC.
[37] Wanlei Zhou,et al. Twitter spam detection: Survey of new approaches and comparative study , 2017, Comput. Secur..
[38] Nor Badrul Anuar,et al. Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..
[39] Filippo Menczer,et al. BotOrNot: A System to Evaluate Social Bots , 2016, WWW.
[40] Premkumar Natarajan,et al. Recurrent Convolutional Strategies for Face Manipulation Detection in Videos , 2019, CVPR Workshops.
[41] Georges J. Jahchan. Privileged User Management , 2016 .
[42] Cong Yan,et al. Enhancing and identifying cloning attacks in online social networks , 2013, ICUIMC '13.
[43] Christoph Meinel,et al. Detect Me If You Can: Spam Bot Detection Using Inductive Representation Learning , 2019, WWW.
[44] Qiang Fu,et al. Combating the evolving spammers in online social networks , 2018, Comput. Secur..
[45] Valliyammai Chinnaiah,et al. Fake profile detection techniques in large-scale online social networks: A comprehensive review , 2017, Comput. Electr. Eng..
[46] Naima Kaabouch,et al. Social Engineering Attacks: A Survey , 2019, Future Internet.
[47] Choon Lin Tan,et al. A survey of phishing attacks: Their types, vectors and technical approaches , 2018, Expert Syst. Appl..
[48] Jianhua Ma,et al. Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective , 2014 .
[49] Manish Shrivastava,et al. Aggression Detection on Social Media Text Using Deep Neural Networks , 2018, ALW.
[50] Roberto Di Pietro,et al. Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling , 2017, IEEE Transactions on Dependable and Secure Computing.
[51] Anuradha Pillai,et al. Study and analysis of Social network Aggregator , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).
[52] Michalis Faloutsos,et al. Efficient and Scalable Socware Detection in Online Social Networks , 2012, USENIX Security Symposium.
[53] James Caverlee,et al. Detecting Spam URLs in Social Media via Behavioral Analysis , 2015, ECIR.
[54] Sajjad Mahmood,et al. Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study , 2020, Arabian Journal for Science and Engineering.
[55] Mazdak Zamani,et al. A Taxonomy of SQL Injection Attacks , 2013, 2013 International Conference on Informatics and Creative Multimedia.
[56] Yuval Elovici,et al. Social Networks : Threats and Solutions , 2013 .
[57] Vandana Rohokale,et al. Cyber Threats and Attack Overview , 2019, Springer Series in Wireless Technology.
[58] Mark Manulis,et al. Security and Privacy in Online Social Networks , 2010, Handbook of Social Network Technologies.
[59] Mohd Yunus Sharum,et al. An effective security alert mechanism for real-time phishing tweet detection on Twitter , 2019, Comput. Secur..
[60] Dominik Herrmann. Cyber Espionage and Cyber Defence , 2019, Information Technology for Peace and Security.
[61] Guanhua Yan,et al. The Rise of Social Botnets: Attacks and Countermeasures , 2016, IEEE Transactions on Dependable and Secure Computing.
[62] Gyu Sang Choi,et al. Spam comments prediction using stacking with ensemble learning , 2018 .
[63] Le Zhang,et al. SybilSCAR: Sybil detection in online social networks via local rule based propagation , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[64] Muhammad Al-Qurishi,et al. Sybil Defense Techniques in Online Social Networks: A Survey , 2017, IEEE Access.
[65] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[66] Alex Talevski,et al. HoneySpam 2.0: Profiling Web Spambot Behaviour , 2009, PRIMA.
[67] Hiran V. Nath,et al. A Survey on Ransomware Detection Techniques , 2019, SKM.
[68] Adriana Iamnitchi,et al. A Survey on Privacy and Security in Online Social Networks , 2015, Online Soc. Networks Media.
[69] Daniele Sgandurra,et al. On Deception-Based Protection Against Cryptographic Ransomware , 2019, DIMVA.
[70] I. Chen,et al. Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey , 2020, ArXiv.
[71] Girish Keshav Palshikar,et al. Frauds in Online Social Networks: A Review , 2018, Lecture Notes in Social Networks.
[72] J. Suler. Identity Management in Cyberspace , 2002 .
[73] Kianoosh G. Boroojeni,et al. Deep Learning-based Model to Fight Against Ad Click Fraud , 2019, ACM Southeast Regional Conference.