Blacklist Creation for Detecting Fake Accounts on Twitter
نویسندگان
چکیده
منابع مشابه
Detecting Hacked Twitter Accounts based on Behavioural Change
Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features associated with behavioural change such as changes in language, source, URLs, retweets, frequency an...
متن کاملImproved Micro-blog Classification for Detecting Abusive Arabic Twitter Accounts
The increased use of social media in Arab regions has attracted spammers seeking new victims. Spammers use accounts on Twitter to distribute adult content in Arabic-language tweets, yet this content is prohibited in these countries due to Arabic cultural norms. These spammers succeed in sending targeted spam by exploiting vulnerabilities in content-filtering and internet censorship systems, pri...
متن کاملDetecting Hacked Twitter Accounts by Examining Behavioural Change using Twitter Metadata
Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his image. In this paper, a classification model is described for detecting these hacked Twitter accounts by examining changing features in behaviour. We look at changes in language, source, URL, retweets, frequency and time. Our mod...
متن کاملDetecting suicidality on Twitter
a Black Dog Institute, The University of New South Wales, Hospital Road, Randwick, NSW 2031, Australia b Commonwealth Scientific and Industrial ResearchOrganisation (CSIRO) Information andCommunication Technology Centre, Corner ofVimiera and PembrokeRoads,Marsfield, NSW2122, Australia c National Institute for Mental Health Research, Building 63, The Australian National University, Canberra ACT ...
متن کاملMining Anonymity: Identifying Sensitive Accounts on Twitter
We explore the feasibility of automatically finding accounts that publish sensitive content on Twitter. One natural approach to this problem is to first create a list of sensitive keywords, and then identify Twitter accounts that use these words in their tweets. But such an approach may overlook sensitive accounts that are not covered by the subjective choice of keywords. In this paper, we inst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Networked and Distributed Computing
سال: 2018
ISSN: 2211-7946
DOI: 10.2991/ijndc.1970.1.7.6