A review of advancements and applications of pre-trained language models in cybersecurity

Z Liu - 2024 12th International Symposium on Digital …, 2024 - ieeexplore.ieee.org
In this paper, we delve into the transformative role of pre-trained language models (PLMs) in
cybersecurity, offering a comprehensive examination of their deployment across a wide …

TwitterGAN: robust spam detection in twitter using novel generative adversarial networks

M Diqi - International Journal of Information Technology, 2023 - Springer
As social media platforms like Twitter continue to evolve, the proliferation of spam content
has become a pressing issue, undermining the credibility of shared messages. Traditional …

[HTML][HTML] The “bitcoin generator” scam

E Badawi, GV Jourdan, IV Onut - Blockchain: Research and Applications, 2022 - Elsevier
Abstract The “Bitcoin Generator Scam”(BGS) is a cyberattack in which scammers promise to
provide victims with free cryptocurrencies in exchange for a small mining fee. In this paper …

Fake profile recognition using profanity and gender identification on online social networks

M Vyawahare, S Govilkar - Social Network Analysis and Mining, 2022 - Springer
Increasing crime rate on online social networking sites is prominently observed in the last
few years. Amount of information present and availability of various types of vulnerable …

[HTML][HTML] A multilayered graph-based framework to explore behavioural phenomena in social media conversations

G Blanco, A Lourenço - International Journal of Medical Informatics, 2023 - Elsevier
Objective Social media is part of current health communications. This research aims to delve
into the effects of social contagion, biased assimilation, and homophily in building and …

Youtube Comment Spam Detection

P Nagaraj, KM Sudar, P Thrived… - 2023 International …, 2023 - ieeexplore.ieee.org
YouTube is the most commonly used application these days. There are both good users and
bad users who use youtube. Spammers have realized that these types of social media are …

NLP-Driven Strategies for Effective Email Spam Detection: A Performance Evaluation

R Dodda, S Maddhi, MS Thuraab… - 2023 International …, 2023 - ieeexplore.ieee.org
In the digital age, spam emails have emerged as a persistent and pervasive nuisance,
inundating our inboxes and bringing with them an array of potential threats. These threats …

Investigating online dating fraud: An extensive review and analysis

S Bharne, P Bhaladhare - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The growth of the online social networking (OSN) platform has been huge in recent
decades. Apart from OSN platforms, online dating websites are gaining attention day by day …

Overlay Security: Email and Social Media

SJ Nielson - Discovering Cybersecurity: A Technical Introduction for …, 2023 - Springer
The rich infrastructure of the Internet and the World Wide Web allows us to build semantic
communications networks that operate at a more abstract level. In this chapter, we'll discuss …

Streak–Social Media Platform with Dynamic Identification of Spam Words, Phishing Urls, Misleading Products and Agencies

D Thamizhselvi, KV Kumar… - 2023 International …, 2023 - ieeexplore.ieee.org
Social networking websites are growing prevalent online. Online users are more likely to
spend time on social networking sites and other websites. Social media users make new …