R Coulter, QL Han, L Pan, J Zhang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Social and Internet traffic analysis is fundamental in detecting and defending cyber attacks. Traditional approaches resorting to manually defined rules are gradually replaced by …
Pervasive growth and usage of the Internet and mobile applications have expanded cyberspace. The cyberspace has become more vulnerable to automated and prolonged …
The present-day world has become all dependent on cyberspace for every aspect of daily living. The use of cyberspace is rising with each passing day. The world is spending more …
Twitter spam has long been a critical but difficult problem to be addressed. So far, researchers have proposed many detection and defence methods in order to protect Twitter …
A Occhipinti, L Rogers, C Angione - Expert systems with applications, 2022 - Elsevier
Text-based communication is highly favoured as a communication mean, especially in business environments. As a result, it is often abused by sending malicious messages, eg …
As the social networking sites get more popular, spammers target these sites to spread spam posts. Twitter is one of the most popular online social networking sites where users …
Twitter spam has long been a critical but difficult problem to be addressed. So far, researchers have developed a series of machine learning-based methods and blacklisting …
S Sedhai, A Sun - IEEE Transactions on Computational Social …, 2017 - ieeexplore.ieee.org
Most existing techniques for spam detection on Twitter aim to identify and block users who post spam tweets. In this paper, we propose a semi-supervised spam detection (S3D) …
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and …