Social media identity deception detection: a survey

A Alharbi, H Dong, X Yi, Z Tari, I Khalil - ACM computing surveys (CSUR), 2021 - dl.acm.org
Social media have been growing rapidly and become essential elements of many people's
lives. Meanwhile, social media have also come to be a popular source for identity deception …

Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data

M Andreoni Lopez, DMF Mattos… - Concurrency and …, 2019 - Wiley Online Library
The late detection of security threats causes a significant increase in the risk of irreparable
damages and restricts any defense attempt. In this paper, we propose a sCAlable TRAffic …

Knowledge‐based approaches for identity management in online social networks

L Bahri, B Carminati, E Ferrari - Wiley Interdisciplinary Reviews …, 2018 - Wiley Online Library
When we meet a new person, we start by introducing ourselves. We share our names, and
other information about our jobs, cities, family status, and so on. This is how socializing and …

A novel defense mechanism to protect users from profile cloning attack on online social networks (osns)

G Jethava, UP Rao - Peer-to-Peer Networking and Applications, 2022 - Springer
Abstract Nowadays, Online Social Networks (OSNs) are becoming more and more popular
means of communication as they are easily accessible and offer advanced features to their …

Multilayer hybrid strategy for phishing email zero‐day filtering

MU Chowdhury, JH Abawajy… - Concurrency and …, 2017 - Wiley Online Library
The cyber security threats from phishing emails have been growing buoyed by the capacity
of their distributors to fine‐tune their trickery and defeat previously known filtering …

Community detection in weighted directed networks using nature-inspired heuristics

E Osaba, J Del Ser, D Camacho, A Galvez… - … Data Engineering and …, 2018 - Springer
Finding groups from a set of interconnected nodes is a recurrent paradigm in a variety of
practical problems that can be modeled as a graph, as those emerging from Social …

Identity deception detection

V Pérez-Rosas, Q Davenport, AM Dai… - Proceedings of the …, 2017 - aclanthology.org
This paper addresses the task of detecting identity deception in language. Using a novel
identity deception dataset, consisting of real and portrayed identities from 600 individuals …

Trolling, cyber-stalking, cyber-bullying, and identity theft in osns: Methods, issues, and challenges

OB Gashroo, S Saleem, M Mehrotra - … of NLP and Deep Learning in …, 2023 - igi-global.com
Before the development of information and communication technology, social connections
were confined by narrow cultural borders. User-generated multimodal information, online …

A fast and accurate threat detection and prevention architecture using stream processing

AGP Lobato, M Andreoni Lopez… - Concurrency and …, 2022 - Wiley Online Library
Late detection of security breaches increases the risk of irreparable damages and limits any
mitigation attempts. We propose a fast and accurate threat detection and prevention …

On the design and tuning of machine learning models for language toxicity classification in online platforms

M Rybinski, W Miller, J Del Ser, MN Bilbao… - Intelligent Distributed …, 2018 - Springer
One of the most concerning drawbacks derived from the lack of supervision in online
platforms is their exploitation by misbehaving users to deliver offending (toxic) messages …