A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges

M Bhattacharya, S Roy, S Chattopadhyay… - Security and …, 2023 - Wiley Online Library
Over the past few years, online social networks (OSNs) have become an inseparable part of
people's daily lives. Instead of being passive readers, people are now enjoying their role as …

Detecting malicious reviews and users affecting social reviewing systems: A survey

C Esposito, V Moscato, G Sperlì - Computers & Security, 2023 - Elsevier
The proliferation of attacks on On-line Social Networks (OSNs) has imposed particular
attention by providers and users. This has an even higher importance for Social Reviewing …

Tweet-based bot detection using big data analytics

A Derhab, R Alawwad, K Dehwah, N Tariq… - IEEE …, 2021 - ieeexplore.ieee.org
Twitter is one of the most popular micro-blogging social media platforms that has millions of
users. Due to its popularity, Twitter has been targeted by different attacks such as spreading …

Core-periphery structure in networks: A statistical exposition

E Yanchenko, S Sengupta - Statistic Surveys, 2023 - projecteuclid.org
Many real-world networks are theorized to have core-periphery structure consisting of a
densely-connected core and a loosely-connected periphery. While this phenomenon has …

Safer: Social capital-based friend recommendation to defend against phishing attacks

Z Guo, JH Cho, R Chen, S Sengupta, M Hong… - Proceedings of the …, 2022 - ojs.aaai.org
The tremendous growth of social media has been accompanied by highly advanced online
social network (OSN) technologies. Such advanced technologies have been heavily utilized …

SEAtech: Deception Techniques in Social Engineering Attacks: An Analysis of Emerging Trends and Countermeasures

D Chapagain, N Kshetri, B Aryal, B Dhakal - arXiv preprint arXiv …, 2024 - arxiv.org
Social Engineering is the act of manipulating individuals to perform actions or reveal
information. Social engineering tactics are widely recognized as a significant risk to …

Social media forensics-a holistic review

B Basumatary, HK Kalita - 2022 9th International Conference …, 2022 - ieeexplore.ieee.org
The imminent and inevitable exponential growth of Social Media platforms in the near future
is undeniable and so is the fact that the Social media ecosystem would be subjected to …

Game-theoretic and machine learning-based approaches for defensive deception: A survey

M Zhu, AH Anwar, Z Wan, JH Cho, C Kamhoua… - arXiv preprint arXiv …, 2021 - arxiv.org
Defensive deception is a promising approach for cyber defense. Via defensive deception,
the defender can anticipate attacker actions; it can mislead or lure attacker, or hide real …

Text mining-based social-psychological vulnerability analysis of potential victims to cybergrooming: Insights and lessons learned

Z Guo, P Wang, JH Cho, L Huang - … of the ACM Web Conference 2023, 2023 - dl.acm.org
Cybergrooming is a serious cybercrime that primarily targets youths through online
platforms. Although reactive predator detection methods have been studied, proactive victim …