A Multi-Faceted Approach to Trending Topic Attack Detection Using Semantic Similarity and Large-Scale Datasets

I Kraidia, A Ghenai, SB Belhaouari - IEEE Access, 2025 - ieeexplore.ieee.org
Twitter's widespread popularity has made it a prime target for malicious actors exploiting
trending hashtags to disseminate harmful content. This study marks the first systematic …

Detecting Pragmatic Ambiguity in Requirement Specification Using Novel Concept Maximum Matching Approach Based on Graph Network

K Aslam, F Iqbal, A Altaf, N Hussain, MG Villar… - IEEE …, 2024 - ieeexplore.ieee.org
Requirements specifications written in natural language enable us to understand a
program's intended functionality, which we can then translate into operational software. At …

Review Evaluation for Hotel Recommendation

YC Hsieh, LC Lu, YF Ku - Electronics, 2023 - mdpi.com
With the prevalence of backpacking and the convenience of using the Internet, many
travelers like sharing their experiences in online communities. The development of online …

Detection of phishing domain using logistic regression technique and feature extraction using bert classification model

K Mittal, KS Gill, R Chauhan, M Singh… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
Phishing attacks pose a severe danger to the security of cyberspace. Phishing is a sort of
fraud in which victims and businesses are deceived into clicking on malicious URLs and …

Filtering and Detection of Real-Time Spam Mail Based on a Bayesian Approach in University Networks

M Sharabov, G Tsochev, V Gancheva, A Tasheva - Electronics, 2024 - mdpi.com
With the advent of digital technologies as an integral part of today's everyday life, the risk of
information security breaches is increasing. Email spam, commonly known as junk email …

Assessing Urdu Language Processing Tools via Statistical and Outlier Detection Methods on Urdu Tweets

Zoya, S Latif, R Latif, H Majeed… - ACM Transactions on …, 2023 - dl.acm.org
Text pre-processing is a crucial step in Natural Language Processing (NLP) applications,
particularly for handling informal and noisy content on social media. Word-level tokenization …

Automated Spam Detection Using ECSA-Based Feature Selection with BGRN Classifier in Soft Computing Applications

B Rajalakshmi, A Thirumalraj, RJ Anandhi… - Soft Computing in …, 2024 - Springer
Soft computing techniques are widely used due to their robustness and tolerance for
imprecision and uncertainty. They are employed in various fields like control systems …

Machine Learning Based Solutions for Detecting Social Media Spam and Phishing Incidents

A Al Shehhi - 2024 - search.proquest.com
The growing digital interactions across various social media platforms increases the risks of
phishing schemes and spam messages that compromise personal and organisational …

[PDF][PDF] SPAM DETECTION IN ROMAN URDU REVIEWS USING SPAMMER BEHAVIOR FEATURES

S Shabbir, M Hussain, A Iqbal, A Rauf, RH Ahmed - researchgate.net
Reviews have emerged recently as the most important basis on which it is decided whether
offered products and services are good or bad. Therefore, customer reviews concern sellers …