A review on social spam detection: Challenges, open issues, and future directions

S Rao, AK Verma, T Bhatia - Expert Systems with Applications, 2021 - Elsevier
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …

Online social networks: threats and solutions

M Fire, R Goldschmidt, Y Elovici - … Communications Surveys & …, 2014 - ieeexplore.ieee.org
Many online social network (OSN) users are unaware of the numerous security risks that
exist in these networks, including privacy violations, identity theft, and sexual harassment …

A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks

D Antonakaki, P Fragopoulou, S Ioannidis - Expert systems with …, 2021 - Elsevier
Twitter is the third most popular worldwide Online Social Network (OSN) after Facebook and
Instagram. Compared to other OSNs, it has a simple data model and a straightforward data …

The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

S Cresci, R Di Pietro, M Petrocchi… - Proceedings of the 26th …, 2017 - dl.acm.org
Recent studies in social media spam and automation provide anecdotal argumentation of
the rise of a new generation of spambots, so-called social spambots. Here, for the first time …

Fame for sale: Efficient detection of fake Twitter followers

S Cresci, R Di Pietro, M Petrocchi, A Spognardi… - Decision Support …, 2015 - Elsevier
Fake followers are those Twitter accounts specifically created to inflate the number of
followers of a target account. Fake followers are dangerous for the social platform and …

Black trolls matter: Racial and ideological asymmetries in social media disinformation

D Freelon, M Bossetta, C Wells… - Social Science …, 2022 - journals.sagepub.com
The recent rise of disinformation and propaganda on social media has attracted strong
interest from social scientists. Research on the topic has repeatedly observed ideological …

Spontaneous collective action: Peripheral mobilization during the Arab Spring

ZC Steinert-Threlkeld - American Political Science Review, 2017 - cambridge.org
Who is responsible for protest mobilization? Models of disease and information diffusion
suggest that those central to a social network (the core) should have a greater ability to …

Twitter spam detection: Survey of new approaches and comparative study

T Wu, S Wen, Y Xiang, W Zhou - Computers & Security, 2018 - Elsevier
Twitter spam has long been a critical but difficult problem to be addressed. So far,
researchers have proposed many detection and defence methods in order to protect Twitter …

Towards detecting anomalous user behavior in online social networks

B Viswanath, MA Bashir, M Crovella, S Guha… - 23rd usenix security …, 2014 - usenix.org
Users increasingly rely on crowdsourced information, such as reviews on Yelp and Amazon,
and liked posts and ads on Facebook. This has led to a market for blackhat promotion …

Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling

S Cresci, R Di Pietro, M Petrocchi… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Spambot detection in online social networks is a long-lasting challenge involving the study
and design of detection techniques capable of efficiently identifying ever-evolving …