Toward detecting malicious links in online social networks through user behavior

B Alghamdi, J Watson, Y Xu - 2016 IEEE/WIC/ACM International …, 2016 - ieeexplore.ieee.org
… We will discuss the current techniques used to identify the … The framework will look at the
messages posted by the user … URL sharing: Posting patterns versus click patterns. in Advances …

Targetvue: Visual analysis of anomalous user behaviors in online communication systems

N Cao, C Shi, S Lin, J Lu, YR Lin… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
… (TLOF) [2] to identify anomalies as the sudden changes of user behaviors based on a set of
… revealed more patterns. As shown in Fig. 8, user (6)’s periodic posting patterns were more …

Social network based microblog user behavior analysis

Q Yan, L Wu, L Zheng - Physica A: Statistical Mechanics and Its …, 2013 - Elsevier
user behavior through the dimension of time. Second, the total number of microblogs posted
by each user will be discussed to analyze user … from the same user was denoted by interval …

Whom should I follow? Identifying relevant users during crises

S Kumar, F Morstatter, R Zafarani, H Liu - … of the 24th ACM conference on …, 2013 - dl.acm.org
… achieved by user identification along two dimensions: user’s … information from all the users
posting about the event. However… Indeed, this pattern can be seen across the Q1s and Q4s for …

UbCadet: detection of compromised accounts in twitter based on user behavioural profiling

S Pv, SMS Bhanu - Multimedia Tools and Applications, 2020 - Springer
… of the approaches to identify anomalous behaviour in OSN … then “normal” pattern of user
activities. Behavioural analytics is a … user behaviour profile, the SBP for each review posted by a …

User recognition from social behavior in computer-mediated social context

M Sultana, PP Paul… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… 3) Temporal Profile (TP): We propose to create TP of users to explore their posting patterns
… -set identification in its present form. However, they can be useful for user identification from a …

Characterization of cross-posting activity for professional users across major osns

R Farahbakhsh, A Cuevas, N Crespi - Proceedings of the 2015 IEEE …, 2015 - dl.acm.org
… FB, G+ and TW which receive a user ID (or username) as input and uses the … patterns by
users over time, we applied the following methodology. Given a post PFB published by a user U …

Social media posters and lurkers: the impact on team identification and game attendance in minor league baseball

J Williams, R Heiser, SJ Chinn - Journal of Direct, Data and Digital …, 2012 - Springer
… The use of social identity theory in this study is designed to reflect its prevalent use with team
identification … significant for the posting model, team identification only partially mediates the …

UUX-Posts: a tool for extracting and classifying postings related to the use of a system

MS Mendes, ES Furtado - Proceedings of the 8th Latin American …, 2017 - dl.acm.org
… tests, which aim to identify Usability and UX problems by analyzing user opinions (by text). …
extraction and classification of postings, as well as to present the patterns used to extract and …

Identifying on-site users for social events: Mobility, content, and social relationship

Z Yu, F Yi, Q Lv, B Guo - IEEE Transactions on Mobile …, 2018 - ieeexplore.ieee.org
… networks for on-site user identification: mobility influence, … mobility pattern F and the user’s
individual mobility pattern f, … collected raw data of user tweets that were posted at the New …