2017 International Conference on Inventive Communication and Computational Technologies (ICICCT) 2017
DOI: 10.1109/icicct.2017.7975235
|View full text |Cite
|
Sign up to set email alerts
|

An integrated approach for malicious tweets detection using NLP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Gharge et al [3] initiate a method, which is classified on the basis of two new aspects. The first one is the recognition of spam tweets without any prior information about the users and the second one is the exploration of language for spam detection on Twitter trending topic at that time.…”
Section: Detecting Spam In Trending Topicmentioning
confidence: 99%
See 1 more Smart Citation
“…Gharge et al [3] initiate a method, which is classified on the basis of two new aspects. The first one is the recognition of spam tweets without any prior information about the users and the second one is the exploration of language for spam detection on Twitter trending topic at that time.…”
Section: Detecting Spam In Trending Topicmentioning
confidence: 99%
“…In addition, it also decreases the repute of the OSN platforms. Therefore, it is essential to design a scheme to spot spammers so that corrective efforts can be taken to counter their malicious activities [3].…”
Section: Introductionmentioning
confidence: 99%
“…2 Literature review Mohawesh et. al [3] offered a thorough analysis of the most significant efforts on machine learning-based fake review identification to date. They have first reviewed the feature extraction strategies employed by numerous researchers.…”
Section: Social Feasibilitymentioning
confidence: 99%
“…What's more, it likewise diminishes the notoriety of the OSN stages. Consequently, it is fundamental to plan a plan to spot spammers with the goal that remedial endeavors can be taken to counter their vindictive exercises [3] . A few research works have been completed in the area of Twitter spam identification.…”
Section: Introductionmentioning
confidence: 99%