[HTML][HTML] Systematic literature review of social media bots detection systems

Z Ellaky, F Benabbou, S Ouahabi - … of King Saud University-Computer and …, 2023 - Elsevier
Online social networks (OSNs) are vital to people's daily lives. They offer free services that
allow people to connect and interact with family and friends, post comments and images …

A survey on detecting spam accounts on Twitter network

O Çıtlak, M Dörterler, İA Doğru - Social Network Analysis and Mining, 2019 - Springer
Social networks have become an inseparable part of our lives today. Services such as
Facebook, Twitter, Instagram, Google+ and LinkedIn in particular have had a significant …

Algorithmically generated malicious domain names detection based on n-grams features

A Cucchiarelli, C Morbidoni, L Spalazzi… - Expert Systems with …, 2021 - Elsevier
Botnets are one of the major cyber infections used in several criminal activities. In most
botnets, a Domain Generation Algorithm (DGA) is used by bots to make DNS queries aimed …

SymbSODA: configurable and verifiable orchestration automation for active malware deception

MSI Sajid, J Wei, E Al-Shaer, Q Duan… - ACM Transactions on …, 2023 - dl.acm.org
Malware is commonly used by adversaries to compromise and infiltrate cyber systems in
order to steal sensitive information or destroy critical assets. Active Cyber Deception (ACD) …

Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network

H Wang, L Yu, S Tian, Y Peng, X Pei - Applied Intelligence, 2019 - Springer
This paper proposes a bidirectional LSTM algorithm (CBIR) based on convolutional neural
network and independent recurrent neural network. The algorithm extracts the “texture …

Robust detection of malicious URLs with self-paced wide & deep learning

Y Liang, Q Wang, K Xiong, X Zheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As cybercrimes grow in scale with devastating economic costs, it is important to protect
potential victims against diverse attacks. In spite of the diversity of cybercrimes, it is the …

# twiti: Social listening for threat intelligence

H Shin, WC Shim, S Kim, S Lee, YG Kang… - Proceedings of the Web …, 2021 - dl.acm.org
Twitter is a popular public source for threat hunting. Many security vendors and security
professionals use Twitter in practice for collecting Indicators of Compromise (IOCs) …

[PDF][PDF] Phishing detection system using machine learning classifiers

D Stiawan - Indonesian Journal of Electrical Engineering and …, 2020 - repository.unsri.ac.id
This development has attracted an attacker with phishing websites to Revised Sep 20, 2019
impromise computer systems. Several solutions have been proposed to Accepted Oct 11 …

Dodgetron: Towards autonomous cyber deception using dynamic hybrid analysis of malware

MSI Sajid, J Wei, MR Alam, E Aghaei… - … IEEE Conference on …, 2020 - ieeexplore.ieee.org
With the advancement of technology, all our valuable and sensitive information has now
moved into digital formats. Adversary utilizes malware as a medium to steal our information …

Capacidades de las metodologías de pruebas de penetración para detectar vulnerabilidades frecuentes en aplicaciones web

HR González Brito… - Revista Cubana de …, 2018 - scielo.sld.cu
En el estudio se analizan las capacidades para la detección de vulnerabilidades en
aplicaciones web que proponen las principales metodologías de pruebas de penetración …