Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2021
DOI: 10.1145/3487351.3492716
|View full text |Cite
|
Sign up to set email alerts
|

Detecting cyber security related Twitter accounts and different sub-groups

Abstract: their generalizability and validation of performance. In addition, there is a lack of more general-purpose sub-classifiers that can classify different sub-groups of cyber security related accounts, e.g., cyber security individuals (vs. groups and organizations), hackers in general (both people and groups), researchers and research organizations, etc. Such sub-classifiers will allow more fine-grained monitoring of the different sub-groups to support more targeted monitoring and behavioral analysis.In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(13 citation statements)
references
References 13 publications
0
12
1
Order By: Relevance
“…Similar research was provided by Mahaini et al in [70]. The authors focused on detecting cybersecurity-related Twitter accounts and different sub-groups.…”
Section: Osint Research Opportunities and Solutionsmentioning
confidence: 75%
See 2 more Smart Citations
“…Similar research was provided by Mahaini et al in [70]. The authors focused on detecting cybersecurity-related Twitter accounts and different sub-groups.…”
Section: Osint Research Opportunities and Solutionsmentioning
confidence: 75%
“…These classifiers include a baseline classifier for identifying accounts related to cybersecurity generally and three sub-classifiers for identifying accounts related to individuals, hackers. Nobili et al in [70] focused on European violence against workers. They noticed that this problem requires a combination of safety and security perspectives.…”
Section: Osint Research Opportunities and Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another recent work by Mahaini et al [23] produced several machine learningbased classification models to detect cybersecurity-related accounts on X. The X platform Sampling Application Programming Interface (API) was used to collect tweets that include cybersecurity related discussions.…”
Section: Related Workmentioning
confidence: 99%
“…It can be noticed that some of the reviewed machine learning and deep learning based models have been applied to datasets including small numbers of collected tweets, such as the models proposed by Deshmukh et al [24] and Behzadan et al [25]. Moreover, the reviewed research studies have focused on applying either machine learning algorithms, as the models proposed by Le et al [20], Ghankutkar et al [21], Arora et al [22], Mahaini [23], and Deshmukh et al [24], or deep learning algorithms, as the models proposed by Behzadan et al, Behzadan, Dionísio et al [26], and Coyac-Torres et al [27]. There are no comparisons conducted between both learning types to discover the most adequate learning algorithm for the proposed cybersecurity data classification models.…”
Section: Related Workmentioning
confidence: 99%