Leveraging analysis of user behavior to identify malicious activities in large-scale social networks

M Al-Qurishi, MS Hossain, M Alrubaian… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
With the enormous growth and volume of online social networks and their features, along
with the vast number of socially connected users, it has become difficult to explain the true …

DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system

S Jamali, R Fotohi - the Journal of Supercomputing, 2017 - Springer
Mobile ad hoc networks (MANETs) are mobile networks, which are automatically outspread
on a geographically limited region, without requiring any preexisting infrastructure. Mostly …

Seminar users in the Arabic Twitter sphere

K Darwish, D Alexandrov, P Nakov… - Social Informatics: 9th …, 2017 - Springer
We introduce the notion of “seminar users”, who are social media users engaged in
propaganda in support of a political entity. We develop a framework that can identify such …

Investigation on social media spam detection

G Shanmugasundaram, S Preethi… - … on Innovations in …, 2017 - ieeexplore.ieee.org
The present use of social media has generated incomparable amounts of social data. Data
could be of text, facts or statistics that are accessible by a computer. A particular data is …

Seminar users in the arabic twitter sphere

Y Mejova - … : 9th International Conference, SocInfo 2017, Oxford …, 2017 - books.google.com
We introduce the notion of “seminar users”, who are social media users engaged in
propaganda in support of a political entity. We develop a framework that can identify such …