Proceedings of the 4th Workshop on Social Network Systems 2011
DOI: 10.1145/1989656.1989664
|View full text |Cite
|
Sign up to set email alerts
|

Facebook immune system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
125
0
2

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 167 publications
(129 citation statements)
references
References 5 publications
0
125
0
2
Order By: Relevance
“…This affects "the metric interplay between fitness and immunity as response and detection latencies become more important than precision and recall". Damage accumulates quickly [53]. The above interplay and further analogies between AIS and IDS support evolution and co-evolution for both defense and offense whose role are interchangeable, and ultimately affect the effectiveness of the self-protection shield to buttress the defense.…”
Section: Immunity and Detectionmentioning
confidence: 92%
See 2 more Smart Citations
“…This affects "the metric interplay between fitness and immunity as response and detection latencies become more important than precision and recall". Damage accumulates quickly [53]. The above interplay and further analogies between AIS and IDS support evolution and co-evolution for both defense and offense whose role are interchangeable, and ultimately affect the effectiveness of the self-protection shield to buttress the defense.…”
Section: Immunity and Detectionmentioning
confidence: 92%
“…For completeness we mention that [53] have reported that they built and deployed a coherent, scalable, and extensible real time system, the Facebook Immune System (FIS), to protect users and the social graph (SG) they span. The use of "Immune" refers to overall defense against attackers (e.g., intruders similar to pathogens) without any specific adherence to AIS except a reference to generic mutation.…”
Section: Immunity and Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Whatever the data in the form of numbers or texts has been extracted. 2) Then after extracting data from social media, splitter technique has been used here by considering space as separator [8]. 3) After that, concept of k-means algorithm has been used where different clusters of malicious keywords are created according to category [9].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Following up their work, Gao et al presented an online spam filtering system that could be deployed as a component of the OSN platform to inspect messages generated by users in real time [7]. Their approach focused on reconstructing spam messages into campaigns for classification rather than examining each post individually.…”
Section: Literature Reviewmentioning
confidence: 99%