Static malware analysis is well-suited to endpoint anti-virus systems as it can be conducted quickly by examining the features of an executable piece of code and matching it to …
In recent years, there has been increased interest in real-world event detection using publicly accessible data made available through Internet technology such as Twitter …
Abstract Malicious Uniform Resource Locators (URLs) embedded in emails or Twitter posts have been used as weapons for luring susceptible Internet users into executing malicious …
This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of …
Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming websites. In this paper, a novel approach is utilized that uses a Neural Network with a …
M Al-Janabi, E Quincey, P Andras - Proceedings of the 2017 IEEE/ACM …, 2017 - dl.acm.org
The increasing volume of malicious content in social networks requires automated methods to detect and eliminate such content. This paper describes a supervised machine learning …
Social networks have generated immense amounts of data that have been successfully utilized for research and business purposes. The approachability and immediacy of social …
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cybercriminals with an …
J Telo - Sage Science Review of Applied Machine …, 2022 - journals.sagescience.org
Malicious URLs are often used to distribute malware, steal personal information, or engage in phishing attacks. Traditional approaches for identifying these URLs are often ineffective …