2020
DOI: 10.11591/ijece.v10i1.pp275-287
|View full text |Cite
|
Sign up to set email alerts
|

Security techniques for intelligent spam sensing and anomaly detection in online social platforms

Abstract: The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 35 publications
0
11
0
Order By: Relevance
“…Weak protocols and policies, their inappropriate documentation [64] too are responsible for a non-robust framework. Since 2008, well-developed phishing techniques provoked the individuals to share their sensitive data [65], 5G shall bring about several revolutionary changes in the way we use IoT systems, applications and solutions. It shall change the way in which IoT is used in every sector including education.…”
Section: Iot In Educationmentioning
confidence: 99%
“…Weak protocols and policies, their inappropriate documentation [64] too are responsible for a non-robust framework. Since 2008, well-developed phishing techniques provoked the individuals to share their sensitive data [65], 5G shall bring about several revolutionary changes in the way we use IoT systems, applications and solutions. It shall change the way in which IoT is used in every sector including education.…”
Section: Iot In Educationmentioning
confidence: 99%
“…Signal power analysis of the seasonal component for a decomposition frequency P enables the identification of regular movements of use, as well as identification of interaction rhythm impact on observations marked by continuity of signal [37,38]. The signal energy of the OSNs interactions expressed in ( 9) combined with the SNR gives a new time series (10).…”
Section: Osns Ativities Analysismentioning
confidence: 99%
“…Access to these platforms raises many issues regarding the level of users' privacy protection [9] which influences OSNs' behavior. In [10] social graphs and weighted weights are employed to detect suspicious actions of certain communities and to prevent cyber-attacks before they occur. The reliability of information is an important parameter in user interactions.…”
Section: Introductionmentioning
confidence: 99%
“…If confidential data is stored not on the phone but on the server of the mobile operator, then operative access to confidential data should be allowed only from the mobile phone using an application that does not have caching, since "caching is a vulnerability that allows the leaked confidential information stored on the phone" [31]. Although he believes that this risk can be reduced using artificial intelligence, that let add adaptability and error resistance when using high-speed computing [32]. This brings into question the reliability of operators.…”
Section: Standards In the Field Of Mobile Connection Information Secumentioning
confidence: 99%