2023
DOI: 10.2339/politeknik.933785
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Spam Detection Framework for Social Networks

Abstract: The widespread use of social networks has caused these platforms to become the target of malicious people. Although social networks have their own spam detection systems, these systems sometimes may not prevent spams in their social networks. Spam contents and messages threaten the security and performance of users of these networks. A spam account detection framework based on three components is proposed in this study. Short link analysis, machine learning and text analysis are the components used together in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 55 publications
0
2
0
Order By: Relevance
“…This situation can cause problems such as more human effort and not detecting phishing URLs in a timely manner [4]. To tackle these disadvantages of phishing URL tanks, researchers primarily focused on traditional machine learning methodologies that can provide a more intelligent phishing detection [5][6][7][8][9][10][11][12]. In the traditional machine learning approach, feature selection is made with the help of cyber security experts, and then phishing detection is performed by using traditional machine learning algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…This situation can cause problems such as more human effort and not detecting phishing URLs in a timely manner [4]. To tackle these disadvantages of phishing URL tanks, researchers primarily focused on traditional machine learning methodologies that can provide a more intelligent phishing detection [5][6][7][8][9][10][11][12]. In the traditional machine learning approach, feature selection is made with the help of cyber security experts, and then phishing detection is performed by using traditional machine learning algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Digital forensic information to be used as evidence in a forensic case is obtained from different technological equipments and various computer applications. Computer applications such as software, databases, web and e-mails are sources from which can be accessed digital forensic information [7], [8]. In addition to these sources, because the computer is allowed to transmit and share the necessary information, research that reveals network information can contribute significantly to the acquisition of needed forensic information [9].…”
Section: Introductionmentioning
confidence: 99%