Methods to Detect Cyberthreats on Twitter

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Twitter is a microblogging service where users can post short messages and communicate with millions of users instantaneously. Twitter has been used for marketing, political campaigns, and during catastrophic events. Unfortunately, Twitter has been exploited by spammers and cybercriminals to post spam, spread malware, and launch different kinds of cyberattacks. The ease of following another user on Twitter, the posting of shortened URLs in tweets, the use of trending hashtags in tweets, and so on, have made innocent users the victims of various cyberattacks. This chapter reviews recent methods to detect spam, spammers, cybercus content, and suspicious users on Twitter. It also presents a unified framework for modeling hreats on Twitter are discussed, specifically in the context of big data and adversarial machine learning.

Cite

CITATION STYLE

APA

Rao, P., Kamhoua, C., Njilla, L., & Kwiat, K. (2018). Methods to Detect Cyberthreats on Twitter. In Advanced Sciences and Technologies for Security Applications (pp. 333–350). Springer. https://doi.org/10.1007/978-3-319-68533-5_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free