[HTML][HTML] Fake news outbreak 2021: Can we stop the viral spread?

T Khan, A Michalas, A Akhunzada - Journal of Network and Computer …, 2021 - Elsevier
Social Networks' omnipresence and ease of use has revolutionized the generation and
distribution of information in today's world. However, easy access to information does not …

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Apache spark: a unified engine for big data processing

M Zaharia, RS Xin, P Wendell, T Das… - Communications of the …, 2016 - dl.acm.org
Apache Spark: a unified engine for big data processing Page 1 56 COMMUNICATIONS OF THE
ACM | NOVEMBER 2016 | VOL. 59 | NO. 11 contributed articles DOI:10.1145/2934664 This …

Detecting Internet of Things attacks using distributed deep learning

GDLT Parra, P Rad, KKR Choo, N Beebe - Journal of Network and …, 2020 - Elsevier
The reliability of Internet of Things (IoT) connected devices is heavily dependent on the
security model employed to protect user data and prevent devices from engaging in …

[PDF][PDF] Dark web illegal activities crawling and classifying using data mining techniques

AHM Alaidi, M Roa'a, HTS ALRikabi, IA Aljazaery… - iJIM, 2022 - academia.edu
Dark web is a canopy concept that denotes any kind of illicit activities carried out by
anonymous persons or organizations, thereby making it difficult to trace. The illicit content on …

The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

S Cresci, R Di Pietro, M Petrocchi… - Proceedings of the 26th …, 2017 - dl.acm.org
Recent studies in social media spam and automation provide anecdotal argumentation of
the rise of a new generation of spambots, so-called social spambots. Here, for the first time …

Malicious URL detection using machine learning: A survey

D Sahoo, C Liu, SCH Hoi - arXiv preprint arXiv:1701.07179, 2017 - arxiv.org
Malicious URL, aka malicious website, is a common and serious threat to cybersecurity.
Malicious URLs host unsolicited content (spam, phishing, drive-by exploits, etc.) and lure …

Twibot-20: A comprehensive twitter bot detection benchmark

S Feng, H Wan, N Wang, J Li, M Luo - Proceedings of the 30th ACM …, 2021 - dl.acm.org
Twitter has become a vital social media platform while an ample amount of malicious Twitter
bots exist and induce undesirable social effects. Successful Twitter bot detection proposals …

Fame for sale: Efficient detection of fake Twitter followers

S Cresci, R Di Pietro, M Petrocchi, A Spognardi… - Decision Support …, 2015 - Elsevier
Fake followers are those Twitter accounts specifically created to inflate the number of
followers of a target account. Fake followers are dangerous for the social platform and …