Detection of bots in social media: a systematic review

M Orabi, D Mouheb, Z Al Aghbari, I Kamel - Information Processing & …, 2020 - Elsevier
Social media bots (automated accounts) attacks are organized crimes that pose potential
threats to public opinion, democracy, public health, stock market and other disciplines. While …

Effective botnet detection through neural networks on convolutional features

SC Chen, YR Chen, WG Tzeng - 2018 17th IEEE International …, 2018 - ieeexplore.ieee.org
Botnet is one of the major threats on the Internet for committing cybercrimes, such as DDoS
attacks, stealing sensitive information, spreading spams, etc. It is a challenging issue to …

Detecting social bots by jointly modeling deep behavior and content information

C Cai, L Li, D Zeng - Proceedings of the 2017 ACM on Conference on …, 2017 - dl.acm.org
Bots are regarded as the most common kind of malwares in the era of Web 2.0. In recent
years, Internet has been populated by hundreds of millions of bots, especially on social …

Combating the evasion mechanisms of social bots

Y Ji, Y He, X Jiang, J Cao, Q Li - computers & security, 2016 - Elsevier
The detection and anti-detection of social botnets constitute an arms race that enables social
botnets to evolve quickly. Existing host-side detection approaches cannot easily detect every …

Leveraging image representation of network traffic data and transfer learning in botnet detection

S Taheri, M Salem, JS Yuan - Big data and cognitive computing, 2018 - mdpi.com
The advancements in the Internet has enabled connecting more devices into this technology
every day. The emergence of the Internet of Things has aggregated this growth. Lack of …

Towards the future of bot detection: A comprehensive taxonomical review and challenges on Twitter/X

D Javed, NZ Jhanjhi, NA Khan, SK Ray, A Al Mazroa… - Computer Networks, 2024 - Elsevier
Abstract Harmful Twitter Bots (HTBs) are widespread and adaptable to a wide range of
social network platforms. The use of social network bots on numerous social network …

Securing malware cognitive systems against adversarial attacks

Y Ji, B Bowman, HH Huang - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
The cognitive systems along with the machine learning techniques have provided significant
improvements for many applications. However, recent adversarial attacks, such as data …

Custompro: Network protocol customization through cross-host feature analysis

Y Chen, T Lan, G Venkataramani - … 2019, Orlando, FL, USA, October 23 …, 2019 - Springer
The implementations of network protocols are often “bloated” due to various users' needs
and complex environment for deployment. The continual expansion of program features …

Efficient defense against covert and side channel attack on multi-core processor using signal processing techniques

H Fang - 2021 - search.proquest.com
Modern application workloads are mostly deployed on cloud computing platforms. Illicit
communication across user domains is prohibited by Operating System (OS) or Virtual …

Understanding and detecting social botnet

Y Ji, Q Li - Botnets, 2019 - taylorfrancis.com
Social botnets have several inherent advantages that enable them to evade common botnet
detection approaches. When a social bot is in a malware-analysis environment, it may not …