Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms

[1]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[2]  A. K. Verma,et al.  Classification of SQL Injection Attacks Using Fuzzy Tainting , 2018 .

[3]  V. D. Sharma,et al.  Social Media Ecosystem: Review on Social Media Profile’s Security and Introduce a New Approach , 2019 .

[4]  Danai Koutra,et al.  BotWalk: Efficient Adaptive Exploration of Twitter Bot Networks , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[5]  Helena Rifà-Pous,et al.  Privacy Analysis on Microblogging Online Social Networks , 2019, ACM Comput. Surv..

[6]  Seyed Hossein Khasteh,et al.  Automatic ICA detection in online social networks with PageRank , 2020, Peer-to-Peer Netw. Appl..

[7]  Xin Wang,et al.  DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks , 2018, IEEE Communications Magazine.

[8]  Madhumita Chatterjee,et al.  Taxonomy of Cyberbullying Detection and Prediction Techniques in Online Social Networks , 2020 .

[9]  Roberto Di Pietro,et al.  The Paradigm-Shift of Social Spambots: Evidence, Theories, and Tools for the Arms Race , 2017, WWW.

[10]  Martin C. Libicki Drawing inferences from cyber espionage , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).

[11]  Jun Zhang,et al.  Twitter spam detection based on deep learning , 2017, ACSW.

[12]  Jong Kim,et al.  WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream , 2013, IEEE Transactions on Dependable and Secure Computing.

[13]  Jenny Torres,et al.  Cross-site scripting (XSS) attacks and mitigation: A survey , 2020, Comput. Networks.

[14]  Bin Liu,et al.  Attribute Inference Attacks in Online Social Networks , 2018, TOPS.

[15]  Debdeep Mukhopadhyay,et al.  RAPPER: Ransomware Prevention via Performance Counters , 2018, ArXiv.

[16]  Athanasios V. Vasilakos,et al.  Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues , 2018, Telecommun. Syst..

[17]  Michele Colajanni,et al.  On the effectiveness of machine and deep learning for cyber security , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).

[18]  S. Vigneshwari,et al.  An enhanced system to identify mischievous social malwares on Facebook applications , 2016, 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT).

[19]  Pedro García-Teodoro,et al.  R-Locker: Thwarting ransomware action through a honeyfile-based approach , 2018, Comput. Secur..

[20]  Hilal Almarabeh,et al.  THE IMPACT OF CYBER THREATS ON SOCIAL NETWORKING SITES , 2019, International Journal of Advanced Research in Computer Science.

[21]  Sébastien Marcel,et al.  DeepFakes: a New Threat to Face Recognition? Assessment and Detection , 2018, ArXiv.

[22]  Maurizio Tesconi,et al.  RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter , 2019, WebSci.

[23]  Gang Wang,et al.  Characterizing and detecting malicious crowdsourcing , 2013, SIGCOMM.

[24]  Gianluca Stringhini,et al.  From risk factors to detection and intervention: a practical proposal for future work on cyberbullying , 2018, Behav. Inf. Technol..

[25]  Jinyuan Jia,et al.  Random Walk Based Fake Account Detection in Online Social Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[26]  Fabio Persia,et al.  A Survey of Online Social Networks: Challenges and Opportunities , 2017, 2017 IEEE International Conference on Information Reuse and Integration (IRI).

[27]  Michalis Faloutsos,et al.  FRAppE: detecting malicious facebook applications , 2012, CoNEXT '12.

[28]  Rohini Lokare,et al.  FRAppE Detecting Malicious Facebook Applications , 2016 .

[29]  Kristina Lerman,et al.  RAPTOR: Ransomware Attack PredicTOR , 2018, ArXiv.

[30]  Daniel Morato,et al.  Open Repository for the Evaluation of Ransomware Detection Tools , 2020, IEEE Access.

[31]  Emilio Ferrara,et al.  The history of digital spam , 2019, Commun. ACM.

[32]  C. D. Jaidhar,et al.  Applicability of machine learning in spam and phishing email filtering: review and approaches , 2020, Artificial Intelligence Review.

[33]  Yi Mu,et al.  On the Design of a New Trust Model for Mobile Agent Security , 2004, TrustBus.

[34]  Niki Pissinou,et al.  Preventing Colluding Identity Clone Attacks in Online Social Networks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[35]  K. R. Venugopal,et al.  Spamming the mainstream: A survey on trending Twitter spam detection techniques , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[36]  Ritesh Kumar,et al.  Aggression-annotated Corpus of Hindi-English Code-mixed Data , 2018, LREC.

[37]  Wanlei Zhou,et al.  Twitter spam detection: Survey of new approaches and comparative study , 2017, Comput. Secur..

[38]  Nor Badrul Anuar,et al.  Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..

[39]  Filippo Menczer,et al.  BotOrNot: A System to Evaluate Social Bots , 2016, WWW.

[40]  Premkumar Natarajan,et al.  Recurrent Convolutional Strategies for Face Manipulation Detection in Videos , 2019, CVPR Workshops.

[41]  Georges J. Jahchan Privileged User Management , 2016 .

[42]  Cong Yan,et al.  Enhancing and identifying cloning attacks in online social networks , 2013, ICUIMC '13.

[43]  Christoph Meinel,et al.  Detect Me If You Can: Spam Bot Detection Using Inductive Representation Learning , 2019, WWW.

[44]  Qiang Fu,et al.  Combating the evolving spammers in online social networks , 2018, Comput. Secur..

[45]  Valliyammai Chinnaiah,et al.  Fake profile detection techniques in large-scale online social networks: A comprehensive review , 2017, Comput. Electr. Eng..

[46]  Naima Kaabouch,et al.  Social Engineering Attacks: A Survey , 2019, Future Internet.

[47]  Choon Lin Tan,et al.  A survey of phishing attacks: Their types, vectors and technical approaches , 2018, Expert Syst. Appl..

[48]  Jianhua Ma,et al.  Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective , 2014 .

[49]  Manish Shrivastava,et al.  Aggression Detection on Social Media Text Using Deep Neural Networks , 2018, ALW.

[50]  Roberto Di Pietro,et al.  Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling , 2017, IEEE Transactions on Dependable and Secure Computing.

[51]  Anuradha Pillai,et al.  Study and analysis of Social network Aggregator , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).

[52]  Michalis Faloutsos,et al.  Efficient and Scalable Socware Detection in Online Social Networks , 2012, USENIX Security Symposium.

[53]  James Caverlee,et al.  Detecting Spam URLs in Social Media via Behavioral Analysis , 2015, ECIR.

[54]  Sajjad Mahmood,et al.  Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study , 2020, Arabian Journal for Science and Engineering.

[55]  Mazdak Zamani,et al.  A Taxonomy of SQL Injection Attacks , 2013, 2013 International Conference on Informatics and Creative Multimedia.

[56]  Yuval Elovici,et al.  Social Networks : Threats and Solutions , 2013 .

[57]  Vandana Rohokale,et al.  Cyber Threats and Attack Overview , 2019, Springer Series in Wireless Technology.

[58]  Mark Manulis,et al.  Security and Privacy in Online Social Networks , 2010, Handbook of Social Network Technologies.

[59]  Mohd Yunus Sharum,et al.  An effective security alert mechanism for real-time phishing tweet detection on Twitter , 2019, Comput. Secur..

[60]  Dominik Herrmann Cyber Espionage and Cyber Defence , 2019, Information Technology for Peace and Security.

[61]  Guanhua Yan,et al.  The Rise of Social Botnets: Attacks and Countermeasures , 2016, IEEE Transactions on Dependable and Secure Computing.

[62]  Gyu Sang Choi,et al.  Spam comments prediction using stacking with ensemble learning , 2018 .

[63]  Le Zhang,et al.  SybilSCAR: Sybil detection in online social networks via local rule based propagation , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[64]  Muhammad Al-Qurishi,et al.  Sybil Defense Techniques in Online Social Networks: A Survey , 2017, IEEE Access.

[65]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[66]  Alex Talevski,et al.  HoneySpam 2.0: Profiling Web Spambot Behaviour , 2009, PRIMA.

[67]  Hiran V. Nath,et al.  A Survey on Ransomware Detection Techniques , 2019, SKM.

[68]  Adriana Iamnitchi,et al.  A Survey on Privacy and Security in Online Social Networks , 2015, Online Soc. Networks Media.

[69]  Daniele Sgandurra,et al.  On Deception-Based Protection Against Cryptographic Ransomware , 2019, DIMVA.

[70]  I. Chen,et al.  Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey , 2020, ArXiv.

[71]  Girish Keshav Palshikar,et al.  Frauds in Online Social Networks: A Review , 2018, Lecture Notes in Social Networks.

[72]  J. Suler Identity Management in Cyberspace , 2002 .

[73]  Kianoosh G. Boroojeni,et al.  Deep Learning-based Model to Fight Against Ad Click Fraud , 2019, ACM Southeast Regional Conference.