Detection of bots in social media: a systematic review

M Orabi, D Mouheb, Z Al Aghbari, I Kamel - Information Processing & …, 2020 - Elsevier
Social media bots (automated accounts) attacks are organized crimes that pose potential
threats to public opinion, democracy, public health, stock market and other disciplines. While …

Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review

T Al lelah, G Theodorakopoulos, P Reinecke… - … of Cybersecurity and …, 2023 - mdpi.com
The widespread adoption of cloud-based and public legitimate services (CPLS) has
inadvertently opened up new avenues for cyber attackers to establish covert and resilient …

Employing program semantics for malware detection

S Naval, V Laxmi, M Rajarajan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In recent years, malware has emerged as a critical security threat. In addition, malware
authors continue to embed numerous anti-detection features to evade the existing malware …

Api2vec: Learning representations of api sequences for malware detection

L Cui, J Cui, Y Ji, Z Hao, L Li, Z Ding - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Analyzing malware based on API call sequence is an effective approach as the sequence
reflects the dynamic execution behavior of malware. Recent advancements in deep learning …

Api2vec++: Boosting api sequence representation for malware detection and classification

L Cui, J Yin, J Cui, Y Ji, P Liu, Z Hao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Analyzing malware based on API call sequences is an effective approach, as these
sequences reflect the dynamic execution behavior of malware. Recent advancements in …

iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees

Y Ji, H Liu, Y Hu, HH Huang - ACM Transactions on Parallel Computing, 2022 - dl.acm.org
Detecting strongly connected components (SCCs) in a directed graph is crucial for
understanding the structure of graphs. Most real-world graphs have one large SCC that …

Combating the evasion mechanisms of social bots

Y Ji, Y He, X Jiang, J Cao, Q Li - computers & security, 2016 - Elsevier
The detection and anti-detection of social botnets constitute an arms race that enables social
botnets to evolve quickly. Existing host-side detection approaches cannot easily detect every …

Towards the future of bot detection: A comprehensive taxonomical review and challenges on Twitter/X

D Javed, NZ Jhanjhi, NA Khan, SK Ray, A Al Mazroa… - Computer Networks, 2024 - Elsevier
Abstract Harmful Twitter Bots (HTBs) are widespread and adaptable to a wide range of
social network platforms. The use of social network bots on numerous social network …

PbMMD: A novel policy based multi-process malware detection

SM Bidoki, S Jalili, A Tajoddin - Engineering Applications of Artificial …, 2017 - Elsevier
Contemporary malware makes wide use of techniques to evade popular detection
approaches. Behavior-based detection is the most powerful approach to malware detection …

Rope: Covert multi-process malware execution with return-oriented programming

DC D'Elia, L Invidia, L Querzoni - … Darmstadt, Germany, October 4–8, 2021 …, 2021 - Springer
Distributed execution designs challenge behavioral analyses of anti-malware solutions by
spreading seemingly benign chunks of a malicious payload to multiple processes …