CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Security techniques for intelligent spam sensing and anomaly detection in online social platforms
Authors
Monther Aldwairi
Lo\u27ai Tawalbeh
Publication date
1 January 2020
Publisher
ZU Scholars
Doi
Cite
Abstract
Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
ZENODO
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:zenodo.org:4082479
Last time updated on 08/08/2023
NEUROSURGERY ENTHUSIASTIC WOMEN SOCIETY
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:zenodo.org:4082479
Last time updated on 02/12/2022
Institute of Advanced Engineering and Science
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:ojs.www.iaescore.com:artic...
Last time updated on 05/09/2020
ZU Scholars (Zayed University)
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:zuscholars.zu.ac.ae:works-...
Last time updated on 03/12/2021