Leveraging analysis of user behavior to identify malicious activities in large-scale social networks

M Al-Qurishi, MS Hossain, M Alrubaian… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
… accuracy in the judgment process of malicious activity detection. … complete algorithm, to
analyze the user behaviors and feed the re… to assess user profiles and detect malicious users. …

Detecting malicious http redirections using trees of user browsing activity

H Mekky, R Torres, ZL Zhang, S Saha… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
… of malicious HTTP redirection chains. In uncovering such malicious chains, we build a per-user
browsing activity tree… trees of related browsing activities on a per use basis. We focus our …

[HTML][HTML] Detecting malicious activity in Twitter using deep learning techniques

L Ilias, I Roussaki - Applied Soft Computing, 2021 - Elsevier
… In the work of [22], a more sophisticated deep learning architecture along with feature
extraction techniques to detect malicious users in Dianping, a location-based social network, was …

Visualizing the insider threat: challenges and tools for identifying malicious user activity

PA Legg - 2015 IEEE Symposium on Visualization for Cyber …, 2015 - ieeexplore.ieee.org
… For this reason, we have focussed on deriving suitable features from user activity profiles,
so that if an anomaly is detected then this has a meaningful context. This also provokes a …

Detecting malicious accounts in online developer communities using deep learning

Q Gong, J Zhang, Y Chen, Q Li, Y Xiao… - Proceedings of the 28th …, 2019 - dl.acm.org
malicious user detection framework called GitSec. GitSec makes use of both the descriptive
data and the fine-grained activity … legitimate and malicious users in developer communities. …

10 bits of surprise: Detecting malicious users with minimum information

R Zafarani, H Liu - Proceedings of the 24th ACM International on …, 2015 - dl.acm.org
… to detect malicious users even when there is minimum information available. In this paper,
we aim to detect malicious users … We introduce the first methodology to detect malicious users

Detection of malicious profiles and protecting users in online social networks

M Senthil Raja, L Arun Raj - Wireless Personal Communications, 2022 - Springer
… accounts across the OSN taking into account vulnerable user uncountable shared posts in
a … activity and behaviors. The research emphasizes detecting malicious users that are users

CNN‐based malicious user detection in social networks

T Hong, C Choi, J Shin - Concurrency and Computation …, 2018 - Wiley Online Library
… to classify the interest categories of certified users and users, precisions of 80% and 79.8% …
users with less likelihood of malicious activities based on the information posted by the user

Malicious user detection in a cognitive radio cooperative sensing system

P Kaligineedi, M Khabbazian… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
… which use these outlier factors to detect the malicious users present in the system. In Section
V, we propose malicious user detection technique which takes into consideration the users’ …

Malicious accounts: Dark of the social networks

KS Adewole, NB Anuar, A Kamsin, KD Varathan… - Journal of Network and …, 2017 - Elsevier
… Social network analysis involves analyzing the topological social structure of the accounts
within the network or extracting discriminative network features to detect malicious users. …