2014
DOI: 10.3844/jcssp.2014.393.402
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Abnormal Behavior in Social Network Websites by Using a Process Mining Technique

Abstract: Detecting abnormal user activity in social network websites could prevent from cyber-crime occurrence. The previous research focused on data mining while this research is based on user behavior process. In this study, the first step is defining a normal user behavioral pattern and the second step is detecting abnormal behavior. These two steps are applied on a case study that includes real and syntactic data sets to obtain more tangible results. The chosen technique used to define the pattern is process mining… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…The maximum fitness measurement value is used as an assessment criterion, i.e., f = 1. The following event logs have been used for evaluation (ProM, 2010) (Sahlabadi et al, 2014;2017).…”
Section: Resultsmentioning
confidence: 99%
“…The maximum fitness measurement value is used as an assessment criterion, i.e., f = 1. The following event logs have been used for evaluation (ProM, 2010) (Sahlabadi et al, 2014;2017).…”
Section: Resultsmentioning
confidence: 99%
“…Committed to. There will be a lot of false news for most of the day [2]. This requires tracking all false news and keeping the database for future reference [10], [12].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Depending on the scenario, different are the points of view that could be used to discover a process, such as the activities executed, persons involved, the resources used, the location where the actions occur, etc. The versatility of process mining techniques has brought about its application to several scenarios (Dakic et al 2018), healthcare (Mans et al 2009;Rozinat et al 2009;Perimal-Lewis et al 2016) and IT (Sahlabadi et al 2014;Mȃruşter and van Beest 2009;Pérez-´A lvarez et al 2018;Fernández-Cerero et al 2019) being the most active areas.…”
Section: Application Of Process Mining In Different Contextsmentioning
confidence: 99%