Asian Journal of Information Technology

Year: 2019
Volume: 18
Issue: 6
Page No. 164 - 172

Survey on Detecting Real Spammers and Consequences of Cyber Attacks in Social Networks

Authors : J.S. Harilakshmanraj and S. Rathi

References

Akoglu, L., R. Chandy and C. Faloutsos, 2013. Opinion fraud detection in online reviews by network effects. Proceedings of the 7th International AAAI Conference on Weblogs and Social Media (ICWSM’13), June 2013, AAAI, Menlo Park, California, USA., pp: 1-10.

Alowibdi, J.S., U.A. Buy, S.Y. Philip and L. Stenneth, 2014. Detecting deception in online social networks. Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’14), August 17-20, 2014, IEEE, Beijing, China, pp: 383-390.

Baer, M., 2010. Cyberstalking and the internet landscape we have constructed. Virginia J. Law Technol., Vol. 15, No. 154.

Bakar, H.S.A., 2013. Investigating the emergence themes of Cyberbullying phenomenon: A grounded theory approach. Proceedings of the 2013 IEEE 63rd Annual Conference on International Council for Education Media (ICEM), October 1-4, 2013, IEEE, Singapore, pp: 1-14.

Benevenuto, F., G. Magno, T. Rodrigues and V. Almeida, 2010. Detecting spammers on twitter. Proceedings of the International Conference on Collaboration, Electronic Messaging, Anti-Abuse and Spam (CEAS’10) Vol. 6, July 13-14, 2010, Redmond, Washington, USA., pp: 1-12.

Bhat, S.Y. and M. Abulaish, 2013. Community-based features for identifying spammers in online social networks. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 25-28, 2013, IEEE, New Delhi, India, ISBN: 978-1-4503-2240-9, pp: 100-107.

Bollen, J., H. Mao and X. Zeng, 2011. Twitter mood predicts the stock market. J. Comput. Sci., 2: 1-8.
Direct Link  |  

Bose, A. and K.G. Shin, 2006. On mobile viruses exploiting messaging and bluetooth services. Proceedings of the 2006 Securecomm and Workshops, August 28-September 1, 2006, IEEE, Baltimore, USA., pp: 1-10.

Boshmaf, Y., M. Ripeanu, K. Beznosov and E. Santos-Neto, 2015. Thwarting fake OSN accounts by predicting their victims. Proceedings of the 8th ACM International Workshop on Artificial Intelligence and Security, October 2015, ACM, New York, USA., pp: 81-89.

Breiman, L., 2001. Random forests. Mach. Learn., 45: 5-32.
CrossRef  |  Direct Link  |  

Chin, C.P.Y., N. Evans and K.K.R. Choo, 2015. Exploring factors influencing the use of enterprise social networks in multinational professional service firms. J. Organizational Comput. Electron. Commerce, 25: 289-315.
Direct Link  |  

Crawford, M., T.M. Khoshgoftaar, J.D. Prusa, A.N. Richter and H. Al Najada, 2015. Survey of review spam detection using machine learning techniques. J. Big Data, Vol. 2, 10.1186/s40537-015-0029-9

D'Ovidio, R. and J. Doyle, 2003. A study on cyberstalking: Understanding investigative hurdles. FBI L. Enforcement Bull., Vol. 72,

Dadvar, M. and A. Niamir, 2016. Adopting maxent to identification of bullying incidents in social networks. Proceedings of the 2016 27th International Workshop on Database and Expert Systems Applications (DEXA’16), September 5-8, 2016, IEEE, Porto, Portugal, pp: 186-189.

De Vel, O., A. Anderson, M. Corney and G. Mohay, 2001. Mining e-mail content for author identification forensics. ACM SIGMOD Rec., 30: 55-64.
CrossRef  |  

Dewan, P. and P. Kumaraguru, 2015. Towards automatic real time identification of malicious posts on Facebook. Proceedings of the 2015 13th Annual International Conference on Privacy, Security and Trust (PST’15), July 21-23, 2015, IEEE, Izmir, Turkey, pp: 85-92.

Dinakar, K., B. Jones, C. Havasi, H. Lieberman and R. Picard, 2012. Common sense reasoning for detection, prevention and mitigation of cyberbullying. ACM. Trans. Interactive Intell. Syst. (TIIS.), 2: 1-30.
Direct Link  |  

Gao, H., Y. Chen, K. Lee, D. Palsetia and A.N. Choudhary, 2012. Towards online spam filtering in social networks. Proceedings of the 19th Annual International Symposium on Network & Distributed System Security (NDSS-2012), February 05-08, 2012, San Diego, California, USA., pp: 1-16.

Garcia-Recuero, A., 2016. Discouraging abusive behavior in privacy-preserving online social networking applications. Proceedings of the 25th International Conference Companion on World Wide Web (WWW’16), April 11-15, 2016, Montreal Quebec Canada, pp: 305-309.

Ghasem, Z., I. Frommholz and C. Maple, 2015. A machine learning framework to detect and document text-based cyberstalking. Proceedings of the LWA 2015 International Workshops on KDML, FGWM, IR and FGDB, October 7-9, 2015, Trier, Germany, pp: 348-355.

Hadjidj, R., M. Debbabi, H. Lounis, F. Iqbal, A. Szporer and D. Benredjem, 2009. Towards an integrated e-mail forensic analysis framework. Digital Investigation, 5: 124-137.
Direct Link  |  

Heydari, A., M. Ali Tavakoli, N. Salim and Z. Heydari, 2015. Detection of review spam: A survey. Expert Syst. Appl., 42: 3634-3642.
CrossRef  |  Direct Link  |  

Hosseinmardi, H., S.A. Mattson, R.I. Rafiq, R. Han, Q. Lv and S. Mishra, 2015. Detection of cyberbullying incidents on the instagram social network. Social Inf. Networks. Vol. 1,

Hutton, M.F. and B. Friedland, 1975. Routh approximations for reducing order of linear time invariant systems. IEEE Trans. Autom. Control, 20: 329-337.
CrossRef  |  

Jindal, N. and B. Liu, 2008. Opinion spam and analysis. Proceedings of the 2008 International Conference on Web Search and Data Mining, February 11-12, 2008, ACM, Palo Alto, California, ISBN:978-1-59593-927-2, pp: 219-230.

Langos, C., 2012. Cyberbullying: The challenge to define. Cyberpsychology Behav. Social Networking, 15: 285-289.
Direct Link  |  

Lenhart, A., K. Purcell, A. Smith and K. Zickuhr, 2010. Social media & mobile internet use among teens and young adults. Pew Internet & American Life Project, Millennials USA. https://eric.ed.gov/?id=ED525056

Li, H., Z. Chen, B. Liu, X. Wei and J. Shao, 2014. Spotting fake reviews via collective positive-unlabeled learning. Proceedings of the 2014 IEEE International Conference on Data Mining, December 14-17, 2014, IEEE, Shenzhen, China, pp: 899-904.

Minnich, A.J., N. Chavoshi, A. Mueen, S. Luan and M. Faloutsos, 2015. Trueview: Harnessing the power of multiple review sites. Proceedings of the 24th International Conference on World Wide Web (WWW'15), May 18-22, 2015, ACM, At Florence, Italy, pp: 787-797.

Mishra, M.K., S. Kumar, A. Vaish and S. Prakash, 2015. Quantifying degree of cyber bullying using level of information shared and associated trust. Proceedings of the 2015 Annual IEEE India Conference on (INDICON’15), December 17-20, 2015, IEEE, New Delhi, India, pp: 1-6.

Ogilvie, E., 2000. The internet and cyberstalking. Proceedings of Criminal Justice Responses Conference, December 7-8, 2000, Australian Institute of Criminology, Sydney, pp: 1-7.

Ortega, F.J., 2013. Detection of dishonest behaviors in on-line networks using graph-based ranking techniques. AI Commun., 26: 327-329.
CrossRef  |  Direct Link  |  

Ott, M., C. Cardie and J. Hancock, 2012. Estimating the prevalence of deception in online review communities. Proceedings of the 21st International Conference on World Wide Web, April 16-20, 2012, ACM, Lyon, France, pp: 201-210.

Rayana, S. and L. Akoglu, 2015. Collective opinion spam detection: Bridging review networks and metadata. Proceedings of the 21th ACM Sigkdd International Conference on Knowledge Discovery and Data Mining (KDD’15), August 10-13, 2015, Sydney, Australia, pp: 985-994.

Reynolds, K., A. Kontostathis and L. Edwards, 2011. Using machine learning to detect cyberbullying. Proceedings of the 2011 10th International Conference on Machine Learning and Applications and Workshops Vol. 2, December 18-21, 2011, IEEE, Honolulu, USA., pp: 241-244.

Sabella, R.A., J.W. Patchin and S. Hinduja, 2013. Cyberbullying myths and realities. Comput. Hum. Behav., 29: 2703-2711.
Direct Link  |  

Santosh, K.C., S.K. Maity and A. Mukherjee, 2017. Enwalk: Learning network features for spam detection in twitter. Proceedings of the International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS’17), July 5-8, 2017, Springer, Washington, USA., pp: 90-101.

Shamash, Y., 1974. Stable reduced-order models using Pade-type approximations. IEEE. Trans. Autom. Control, 19: 615-616.
CrossRef  |  Direct Link  |  

Shehnepoor, S., M. Salehi, R. Farahbakhsh and N. Crespi, 2017. NetSpam: A network-based spam detection framework for reviews in online social media. IEEE. Trans. Inf. Forensic. Secur., 12: 1585-1595.
CrossRef  |  Direct Link  |  

Sheridan, L.P. and T. Grant, 2007. Is cyberstalking different?. Psychol. Crime Law, 13: 627-640.
Direct Link  |  

Spitzberg, B.H. and W.R. Cupach, 2007. The state of the art of stalking: Taking stock of the emerging literature. Aggression Violent Behav., 12: 64-86.
CrossRef  |  Direct Link  |  

Stein, T., E. Chen and K. Mangla, 2011. Facebook immune system. Proceedings of the 4th International Workshop on Social Network Systems, April 10, 2011, ACM, New York, USA., pp: 1-8.

Tan, E., L. Guo, S. Chen, X. Zhang and Y. Zhao, 2013. Unik: Unsupervised social network spam detection. Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, October 27-November 01, 2013, ACM, New York, USA., ISBN: 978-1-4503-2263-8, pp: 479-488.

Vandebosch, H. and K. Van Cleemput, 2008. Defining cyberbullying: A qualitative research into the perceptions of youngsters. Cyberpsychol. Behav., 11: 499-503.
CrossRef  |  

Vandebosch, H. and K. van Cleemput, 2009. Cyberbullying among youngsters: Profiles of bullies and victims. New Media Soc., 11: 1349-1371.
CrossRef  |  Direct Link  |  

Viswanath, B., M.A. Bashir, M. Crovella, S. Guha, K.P. Gummadi, B. Krishnamurthy and A. Mislove, 2014. Towards detecting anomalous user behavior in online social networks. Proceediongs of the 23rd USENIX International Security Symposium (USENIX Security’14), August 20-22, 2014, San Diego, California, USA., pp: 223-238.

Wu, T., S. Liu, J. Zhang and Y. Xiang, 2017. Twitter spam detection based on deep learning. Proceedings of the Australasian Multiconference on Computer Science Week, January 30-February 03, 2017, ACM, New York, USA., pp: 1-8.

Xu, C. and J. Zhang, 2015. Combating product review spam campaigns via multiple heterogeneous pairwise features. Proceedings of the 2015 SIAM International Conference on Data Mining, June 2015, Society for Industrial and Applied Mathematics, Philadelphia, Pennsylvania, USA., pp: 172-180.

Yu, D., N. Chen, F. Jiang, B. Fu and A. Qin, 2017. Constrained NMF-based semi-supervised learning for social media spammer detection. Knowl. Based Syst., 125: 64-73.
CrossRef  |  Direct Link  |  

Zheng, X., X. Zhang, Y. Yu, T. Kechadi and C. Rong, 2016. ELM-based spammer detection in social networks. J. Supercomputing, 72: 2991-3005.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved