2017 International Carnahan Conference on Security Technology (ICCST) 2017
DOI: 10.1109/ccst.2017.8167794
|View full text |Cite
|
Sign up to set email alerts
|

A multi-language approach towards the identification of suspicious users on social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…In [13], a system for supporting the surveillance and monitoring of cyber-trafficking, whose communication is centred on social media, is proposed. Furthermore, some case studies on social networks, where the criminals exploit Twitter as means to communicate among each other in order to organize their criminal activities, are presented in [22,[53][54][55].…”
Section: Crime Detection Approaches On Social Networkmentioning
confidence: 99%
“…In [13], a system for supporting the surveillance and monitoring of cyber-trafficking, whose communication is centred on social media, is proposed. Furthermore, some case studies on social networks, where the criminals exploit Twitter as means to communicate among each other in order to organize their criminal activities, are presented in [22,[53][54][55].…”
Section: Crime Detection Approaches On Social Networkmentioning
confidence: 99%
“…Semiotic is the science that studies the life of signs within the society. This is important because in addition to analyzing text, identify topics, other complementary information need be to considered such as cultural aspects, location, religion, language and so on [38]. By exploiting such approach, the current research directions are devoted to (see Fig 4):…”
Section: Cyber Tools and Servicesmentioning
confidence: 99%
“…Information in the user profile can be explicitly provided by the user (explicit user profile), or more frequently, analyzed implicitly by using interaction data between the users and the system (implicit user profile) (Gauch et al 2007). Beyond personalized or adaptive systems, user profiling can also be at the base of behavioral analysis systems for improving decision-making, such as anomaly detection systems (Kwon et al 2021;Wang et al 2018), fraud detection systems (Lausen et al 2020;Zhao et al 2016), customer scoring systems (Esmeli et al 2020;Ramkumar et al 2010), influencer or leader detection systems (Girgin 2021;Primo et al 2021), and terrorist networks (Tundis and Mühlhäuser 2017;Yadav et al 2019).…”
Section: Introductionmentioning
confidence: 99%