Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning
暂无分享,去创建一个
[1] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[2] Kim-Kwang Raymond Choo,et al. The convergence of new computing paradigms and big data analytics methodologies for online social networks , 2018, J. Comput. Sci..
[3] Jong Hyuk Park,et al. Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..
[4] Georgia Koutrika,et al. Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges , 2007, IEEE Internet Computing.
[5] N. Arunkumar,et al. Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..
[6] Calton Pu,et al. Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks , 2011, IEEE Internet Computing.
[7] Aziz Mohaisen,et al. AMAL: High-fidelity, behavior-based automated malware analysis and classification , 2014, Comput. Secur..
[8] Christopher M. Danforth,et al. An evolutionary algorithm approach to link prediction in dynamic social networks , 2013, J. Comput. Sci..
[9] Sotiris Ioannidis,et al. Understanding the behavior of malicious applications in social networks , 2010, IEEE Network.
[10] Xianghan Zheng,et al. ELM-based spammer detection in social networks , 2016, The Journal of Supercomputing.
[11] Wesley Shu,et al. The Perceived Benefits of 6-Degree-Separation Social Networks , 2011, Internet Res..
[12] Nor Badrul Anuar,et al. Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..
[13] Xiuzhen Zhang,et al. Anomaly detection in online social networks , 2014, Soc. Networks.
[14] Edgar R. Weippl,et al. Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam , 2011, IEEE Internet Computing.
[15] Mikhail J. Atallah,et al. Private Information: To Reveal or not to Reveal , 2008, TSEC.
[16] Kaiqi Zhang,et al. Maximizing influence in a social network: Improved results using a genetic algorithm , 2017 .
[17] Zheyi Chen,et al. Detecting spammers on social networks , 2015, Neurocomputing.
[18] Quanyan Zhu,et al. Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.
[19] Linyuan Lu,et al. Link Prediction in Complex Networks: A Survey , 2010, ArXiv.
[20] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[21] Haining Wang,et al. BogusBiter: A transparent protection against phishing attacks , 2010, TOIT.
[22] Pooya Moradian Zadeh,et al. A Multi-Population Cultural Algorithm for Community Detection in Social Networks , 2015, ANT/SEIT.
[23] Hossam Faris,et al. Evolving Support Vector Machines using Whale Optimization Algorithm for spam profiles detection on online social networks in different lingual contexts , 2018, Knowl. Based Syst..