Publication Cover
Cybernetics and Systems
An International Journal
Volume 54, 2023 - Issue 7
139
Views
3
CrossRef citations to date
0
Altmetric
Research Articles

How Safe You Are on Social Networks?

ORCID Icon &

References

  • Adewole, K. S., N. B. Anuar, A. Kamsin, K. D. Varathan, and S. A. Razak. 2017. Malicious accounts: Dark of the social networks. Journal of Network and Computer Applications 79:41–67. doi:10.1016/j.jnca.2016.11.030.
  • Balaanand, M., N. Karthikeyan, S. Karthik, R. Varatharajan, G. Manogaran, and C. B. Sivaparthipan. 2019. An enhanced graph-based semi-supervised learning algorithm to detect fake users on Twitter. The Journal of Supercomputing 75 (9):6085–105. doi:10.1007/s11227-019-02948-w.
  • Bilge, L. T. Strufe, D. Balzarotti, and E. Kirda. 2009. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web, 551–560. ACM.
  • Cao, Q. M. Sirivianos, X. Yang, and T. Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, 15. USENIX Association.
  • Chen, J. I., and L. Kong-Long. 2021. Deep convolution neural network model for credit-card fraud detection and alert. Journal of Artificial Intelligence 3 (2):101–12. doi:10.36548/jaicn.2021.2.003.
  • Conti, M. R. Poovendran, and M. Secchiero. 2012. Fakebook: Detecting fake profiles in on-line social networks. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 1071–1078. IEEE.
  • Fire, M., D. Kagan, A. Elyashar, and Y. Elovici. 2014. Friend or foe? Fake profile identification in online social networks. Social Network Analysis and Mining 4 (1):1–23. doi:10.48550/arXiv.1303.3751.
  • Fire, M., G. Katz, and Y. Elovici. 2012. Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies. Human Journal 1 (1):26–39.
  • Gani, K. H. Hacid, and R. Skraba. 2012. Towards multiple identity detection in social networks. In Proceedings of the 21st International Conference on World Wide Web, 503–504. ACM.
  • Grier, C. K. Thomas, V. Paxson, and M. Zhang. 2010. @ spam: the underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and communications security, 27–37. ACM. doi:10.1145/1866307.1866311.
  • Gunti, P., B. B. Gupta, and E. Benkhelifa. 2022. Data mining approaches for sentiment analysis in online social networks (OSNs). In Data mining approaches for big data and sentiment analysis in social media, 116–41. IGI Global. doi:10.4018/978-1-7998-8413-2.ch005.
  • Hall, M. A. 1999. Correlation-based feature selection for machine learning. PhD diss., Hamilton, New Zealand.
  • Hamdan, Y. B. 2020. Faultless decision making for false information in online: A systematic approach. Journal of Soft Computing Paradigm (JSCP) 2 (4):226–35. doi:10.36548/jscp.2020.4.004.
  • Jabardi, M. H., and A. S. Hadi. 2021. Ontology Meter for Twitter Fake Accounts Detection. International Journal of Intelligent Engineering and Systems 14 (1):410–9. doi:10.22266/ijies2021.0228.38.
  • Jin, L. H. Takabi, and J. B. Joshi. 2011. Towards active detection of identity clone attacks on online social networks. In Proceedings of the First ACM Conference on Data and application security and privacy, 27–38. ACM. doi:10.1145/1943513.1943520.
  • Kondeti, P. L. P. Yerramreddy, A. Pradhan, and G. Swain. 2021. Fake account detection using machine learning. In Proceedings of evolutionary computing and mobile sustainable networks, 791–802. Singapore: Springer.
  • Kontaxis, G. I. Polakis, S. Ioannidis, and E. P. Markatos. 2011. Detecting social network profile cloning. In International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 295–300. IEEE.
  • Krombholz, K., D. Merkl, and E. Weippl. 2012. Fake identities in social media: A case study on the sustainability of the Facebook business model. Journal of Service Science Research 4 (2):175–212. doi:10.1007/s12927-012-0008-z.
  • Lu, Z., D. Szafron, R. Greiner, P. Lu, D. S. Wishart, B. Poulin, J. Anvik, C. Macdonell, and R. Eisner. 2004. Predicting subcellular localization of proteins using machine-learned classifiers. Bioinformatics (Oxford, England) 20 (4):547–56. doi:10.1093/bioinformatics/btg447.
  • Malhotra, A. L. Totti, W. Meira, Jr, P. Kumaraguru, and V. Almeida. 2012. Studying user footprints in different online social networks. In International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 1065–1070. IEEE.
  • Manoharan, J. S. 2021. Study of variants of extreme learning machine (ELM) brands and its performance measure on classification algorithm. Journal of Soft Computing Paradigm (JSCP) 3 (2):83–95. doi:10.36548/jscp.2021.2.003.
  • Pandian, A. P. 2021. Performance evaluation and comparison using deep learning techniques in sentiment analysis. Journal of Soft Computing Paradigm 3 (2):123–34. doi:10.36548/jscp.2021.2.006.
  • Python, 2015. https://www.python.org/. Accessed Aug., 2015.
  • Ruhela, A., A. Bagchi, A. Mahanti, and A. Seth. 2016. The rich and middle classes on Twitter: Are popular users indeed different from regular users? Computer Communications 73:219–28. doi:10.1016/j.comcom.2015.07.024.
  • Sahoo, S. R., and B. B. Gupta. 2019. Hybrid approach for detection of malicious profiles in Twitter. Computers & Electrical Engineering 76:65–81. doi:10.1016/j.compeleceng.2019.03.003.
  • Sahoo, S. R., and B. B. Gupta. 2021. Real-time detection of fake account in twitter using machine-learning approach. In. Proceedings of Advances in Computational Intelligence and Communication Technology, 149–59. Singapore: Springer. doi:10.1007/978-981-15-1275-9_13.
  • Sahoo, S. R. B. B. Gupta, D. Peraković, F. J. G. Peñalvo, and I. Cvitić. 2022. Spammer detection approaches in online social network (OSNs): A survey. In Sustainable Management of Manufacturing Systems in Industry 4.0, 159–80. Cham: Springer. doi:10.1007/978-3-030-90462-3_11.
  • Schein, A. I., and L. H. Ungar. 2007. Active learning for logistic regression: An evaluation. Machine Learning 68 (3):235–65. Springer. doi:10.1007/s10994-007-5019-5.
  • Singh, M., D. Bansal, and S. Sofat. 2016a. Behavioral analysis and classification of spammers distributing pornographic content in social media. Social Network Analysis and Mining 6 (1):1–18. doi:10.1007/s13278-016-0350-0.
  • Singh, M., D. Bansal, and S. Sofat. 2016b. Followers or fradulents? An analysis and classification of Twitter followers market merchants. Cybernetics and Systems 47 (8):674–89. doi:10.1080/01969722.2016.1237227.
  • Singh, M., D. Bansal, and S. Sofat. 2018. Who is who on Twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time. Cybernetics and Systems 49 (1):1–25. doi:10.1080/01969722.2017.1412866.
  • Tripathi, M. 2021. Sentiment analysis of Nepali COVID19 tweets using NB, SVM, and LSTM. Journal of Artificial Intelligence and Capsule Networks 3 (3):151–68. doi:10.36548/jaicn.2021.3.001.
  • Tweepy Library for Python, 2015. https://pypi.python.org/pypi/tweepy. Accessed Aug. 2015.
  • Wanda, P., and H. J. Jie. 2020. DeepProfile: Finding fake profile in online social network using dynamic CNN. Journal of Information Security and Applications 52 (102465):102465. doi:10.1016/j.jisa.2020.102465.
  • Wang, Y., F. S. Makedon, J. C. Ford, and J. Pearlman. 2005. HykGene: a hybrid approach for selecting marker genes for phenotype classification using microarray gene expression data. Bioinformatics (Oxford, England) 21 (8):1530–7. doi:10.1093/bioinformatics/bti192.
  • Yadav, K. B. B. Gupta, and D. Peraković. 2022. DeepFake: A deep learning approach in artificial content generation.
  • Yadav, U. S. B. B. Gupta, D. Peraković, F. J. G. Peñalvo, and I. Cvitić. 2022. Security and privacy of cloud-based online online social media: A survey. In Sustainable management of manufacturing systems in industry 4.0, 213–36. Cham: Springer.
  • Yang, Z., C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. 2014. Uncovering social network sybils in the wild. ACM Transactions on Knowledge Discovery from Data 8 (1):1–29. doi:10.1145/2556609.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.