The rise of “blockchain”: bibliometric analysis of blockchain study

A Firdaus, MFA Razak, A Feizollah, IAT Hashem… - Scientometrics, 2019 - Springer
The blockchain is a technology which accumulates and compiles data into a chain of
multiple blocks. Many blockchain researchers are adopting it in multiple areas. However …

DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks

Y Chen, H Xie, K Lv, S Wei, C Hu - Information Sciences, 2019 - Elsevier
Social networks record a significant amount of user behavior data every day. By analyzing
this behavior data, companies or attackers use it for marketing or more questionable …

SMSAD: a framework for spam message and spam account detection

KS Adewole, NB Anuar, A Kamsin… - Multimedia Tools and …, 2019 - Springer
Short message communication media, such as mobile and microblogging social networks,
have become attractive platforms for spammers to disseminate unsolicited contents …

Predicting the role of political trolls in social media

A Atanasov, GDF Morales, P Nakov - arXiv preprint arXiv:1910.02001, 2019 - arxiv.org
We investigate the political roles of" Internet trolls" in social media. Political trolls, such as the
ones linked to the Russian Internet Research Agency (IRA), have recently gained enormous …

Analyzing real and fake users in Facebook network based on emotions

N Agarwal, S Jabin, SZ Hussain - 2019 11th International …, 2019 - ieeexplore.ieee.org
Fake profile detection is one of the critical problems in Online Social Networks (OSNs). So
far, studies have mainly focused on profile-based, behavioral-based, network-based and …

Data lake: A plausible big data science for business intelligence

S Vats, BB Sagar - Communication and Computing Systems, 2019 - taylorfrancis.com
Big Data analytics is a more extensive term that incorporates data analysis. Data analytics is
a train that includes the administration of the total data lifecycle, which integrates gathering …

Info-trust: A multi-criteria and adaptive trustworthiness calculation mechanism for information sources

Y Gao, X Li, J Li, Y Gao, SY Philip - IEEE Access, 2019 - ieeexplore.ieee.org
Social media have become increasingly popular for the sharing and spreading of user-
generated content due to their easy access, fast dissemination, and low cost. Meanwhile …

The art of social bots: A review and a refined taxonomy

M Latah - arXiv preprint arXiv:1905.03240, 2019 - arxiv.org
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as a command and control (C\&C) channel. Malicious social bots were responsible …

[PDF][PDF] 基于混合结构深度神经网络的HTTP 恶意流量检测方法

李佳, 云晓春, 李书豪, 张永铮… - Journal on …, 2019 - infocomm-journal.com
针对HTTP 恶意流量检测问题, 提出了一种基于裁剪机制和统计关联的预处理方法,
进行流量的统计信息关联及归一化处理. 基于原始数据与经验特征工程相结合的思想提出了一种 …

“Less give more”: evaluate and zoning android applications

MF Ab Razak, NB Anuar, R Salleh, A Firdaus, M Faiz… - Measurement, 2019 - Elsevier
The Android security mechanism is the first approach to protect data, system resource as
well as reduce the impact of malware. Past malware studies tend to investigate the novel …