A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Heterogeneous graph neural networks for malicious account detection

Z Liu, C Chen, X Yang, J Zhou, X Li… - Proceedings of the 27th …, 2018 - dl.acm.org
We present, GEM, the first heterogeneous graph neural network approach for detecting
malicious accounts at Alipay, one of the world's leading mobile cashless payment platform …

Poisoning attacks to graph-based recommender systems

M Fang, G Yang, NZ Gong, J Liu - … of the 34th annual computer security …, 2018 - dl.acm.org
Recommender system is an important component of many web services to help users locate
items that match their interests. Several studies showed that recommender systems are …

[PDF][PDF] A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security

M Safaei Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - par.nsf.gov
abstract As the Internet has transformed into a critical infrastructure, society has become
more vulnerable to its security flaws. Despite substantial efforts to address many of these …

Dawn: Dynamic adversarial watermarking of neural networks

S Szyller, BG Atli, S Marchal, N Asokan - Proceedings of the 29th ACM …, 2021 - dl.acm.org
Training machine learning (ML) models is expensive in terms of computational power,
amounts of labeled data and human expertise. Thus, ML models constitute business value …

Towards detecting compromised accounts on social networks

M Egele, G Stringhini, C Kruegel… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Compromising social network accounts has become a profitable course of action for
cybercriminals. By hijacking control of a popular media or business account, attackers can …

A first look at zoombombing

C Ling, U Balcı, J Blackburn… - 2021 IEEE symposium …, 2021 - ieeexplore.ieee.org
Online meeting tools like Zoom and Google Meet have become central to our professional,
educational, and personal lives. This has opened up new opportunities for large scale …

Trollmagnifier: Detecting state-sponsored troll accounts on reddit

MH Saeed, S Ali, J Blackburn… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Growing evidence points to recurring influence campaigns on social media, often sponsored
by state actors aiming to manipulate public opinion on sensitive political topics. Typically …

Detecting fake accounts in online social networks at the time of registrations

D Yuan, Y Miao, NZ Gong, Z Yang, Q Li… - Proceedings of the …, 2019 - dl.acm.org
Online social networks are plagued by fake information. In particu-lar, using massive fake
accounts (also called Sybils), an attacker can disrupt the security and privacy of benign …

On the detection of disinformation campaign activity with network analysis

L Vargas, P Emami, P Traynor - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
seek to influence and polarize political topics through massive coordinated efforts. In the
process, these efforts leave behind artifacts, which researchers have leveraged to analyze …