{"id":"https://openalex.org/W7130513841","doi":"https://doi.org/10.1002/dac.70445","title":"Detection of Anomalies in Social Multimedia Domain With AI Integrated Software\u2010Defined Networking","display_name":"Detection of Anomalies in Social Multimedia Domain With AI Integrated Software\u2010Defined Networking","publication_year":2026,"publication_date":"2026-02-19","ids":{"openalex":"https://openalex.org/W7130513841","doi":"https://doi.org/10.1002/dac.70445"},"language":"en","primary_location":{"id":"doi:10.1002/dac.70445","is_oa":true,"landing_page_url":"https://doi.org/10.1002/dac.70445","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/dac.70445","source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/dac.70445","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5126434786","display_name":"D. Ganesh","orcid":null},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"D. Ganesh","raw_affiliation_strings":["Department of Computer Science and Information Technology JAIN (Deemed\u2010to\u2010be University)  Bangalore Karnataka India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Technology JAIN (Deemed\u2010to\u2010be University)  Bangalore Karnataka India","institution_ids":["https://openalex.org/I106826634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008848312","display_name":"Harshal Shah","orcid":"https://orcid.org/0000-0003-0047-4890"},"institutions":[{"id":"https://openalex.org/I4210112983","display_name":"Parul University","ror":null,"country_code":"IN","type":null,"lineage":["https://openalex.org/I4210112983"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Harshal Shah","raw_affiliation_strings":["Department of Computer Science and Engineering, Faculty of Engineering and Technology, Parul Institute of Technology Parul University  Vadodara Gujarat India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Faculty of Engineering and Technology, Parul Institute of Technology Parul University  Vadodara Gujarat India","institution_ids":["https://openalex.org/I4210112983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085174289","display_name":"Arun Kumar Marandi","orcid":"https://orcid.org/0000-0003-1507-7580"},"institutions":[{"id":"https://openalex.org/I187761245","display_name":"National Institute of Technology Jamshedpur","ror":"https://ror.org/01sebzx27","country_code":"IN","type":"education","lineage":["https://openalex.org/I187761245"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arun\u00a0Kumar Marandi","raw_affiliation_strings":["Department of Computer Science &amp; IT Arka Jain University  Jamshedpur Jharkhand India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science &amp; IT Arka Jain University  Jamshedpur Jharkhand India","institution_ids":["https://openalex.org/I187761245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060618126","display_name":"Shweta Loonkar","orcid":"https://orcid.org/0000-0001-8227-5937"},"institutions":[{"id":"https://openalex.org/I169877490","display_name":"University of Mumbai","ror":"https://ror.org/032hdk172","country_code":"IN","type":"education","lineage":["https://openalex.org/I169877490"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shweta Loonkar","raw_affiliation_strings":["Department of ISME ATLAS SkillTech University  Mumbai Maharashtra India"],"affiliations":[{"raw_affiliation_string":"Department of ISME ATLAS SkillTech University  Mumbai Maharashtra India","institution_ids":["https://openalex.org/I169877490"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126443754","display_name":"Aarju","orcid":null},"institutions":[{"id":"https://openalex.org/I90610274","display_name":"University of Engineering and Technology Peshawar","ror":"https://ror.org/00p034093","country_code":"PK","type":"education","lineage":["https://openalex.org/I90610274"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Aarju","raw_affiliation_strings":["Department of Computer Science and Engineering School of Engineering and Technology, CGC University  Mohali Punjab India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering School of Engineering and Technology, CGC University  Mohali Punjab India","institution_ids":["https://openalex.org/I90610274"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075341122","display_name":"Jayant Jagtap","orcid":"https://orcid.org/0000-0003-1650-3246"},"institutions":[{"id":"https://openalex.org/I2800157045","display_name":"NIMS University","ror":"https://ror.org/05tw0x522","country_code":"IN","type":"education","lineage":["https://openalex.org/I2800157045"]},{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Jayant Jagtap","raw_affiliation_strings":["NIMS School of Computing Science and Artificial Intelligence NIMS University Rajasthan  Jaipur India","Sharda School of Engineering and Sciences Sharda University  Greater Noida UP India"],"affiliations":[{"raw_affiliation_string":"NIMS School of Computing Science and Artificial Intelligence NIMS University Rajasthan  Jaipur India","institution_ids":["https://openalex.org/I2800157045"]},{"raw_affiliation_string":"Sharda School of Engineering and Sciences Sharda University  Greater Noida UP India","institution_ids":["https://openalex.org/I74885063"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5126434786"],"corresponding_institution_ids":["https://openalex.org/I106826634"],"apc_list":{"value":3450,"currency":"USD","value_usd":3450},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.55446194,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"39","issue":"5","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.23739999532699585,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.23739999532699585,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.1875,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.061799999326467514,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.609000027179718},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.5188000202178955},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.45750001072883606},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4187999963760376},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.4047999978065491},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.3939000070095062},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.3718999922275543},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.33869999647140503}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9140999913215637},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.609000027179718},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.5188000202178955},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.45750001072883606},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4187999963760376},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4092000126838684},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.4047999978065491},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3939000070095062},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.3718999922275543},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.33869999647140503},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.33500000834465027},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3287999927997589},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.328000009059906},{"id":"https://openalex.org/C61224824","wikidata":"https://www.wikidata.org/wiki/Q2260434","display_name":"Mixture model","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3061999976634979},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.29760000109672546},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2930999994277954},{"id":"https://openalex.org/C21569690","wikidata":"https://www.wikidata.org/wiki/Q94702","display_name":"Collaborative filtering","level":3,"score":0.2879999876022339},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.2797999978065491},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2757999897003174},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2660999894142151},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.2648000121116638},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.2619999945163727},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C194051981","wikidata":"https://www.wikidata.org/wiki/Q1337691","display_name":"Economic shortage","level":3,"score":0.25870001316070557}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/dac.70445","is_oa":true,"landing_page_url":"https://doi.org/10.1002/dac.70445","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/dac.70445","source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1002/dac.70445","is_oa":true,"landing_page_url":"https://doi.org/10.1002/dac.70445","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/dac.70445","source":{"id":"https://openalex.org/S175310385","display_name":"International Journal of Communication Systems","issn_l":"1074-5351","issn":["1074-5351","1099-1131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6525045037269592}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7130513841.pdf","grobid_xml":"https://content.openalex.org/works/W7130513841.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W2782698453","https://openalex.org/W2952401696","https://openalex.org/W3035240583","https://openalex.org/W3036218202","https://openalex.org/W3129243716","https://openalex.org/W3137955819","https://openalex.org/W3153256055","https://openalex.org/W3158755204","https://openalex.org/W4205253049","https://openalex.org/W4207047994","https://openalex.org/W4210813643","https://openalex.org/W4283215087","https://openalex.org/W4284882219","https://openalex.org/W4290466961","https://openalex.org/W4386903117","https://openalex.org/W4388570277"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Social":[1],"multimedia":[2,190],"(SM)":[3],"platforms":[4],"such":[5,159],"as":[6,160],"Instagram,":[7],"LinkedIn,":[8],"YouTube,":[9],"Facebook,":[10],"and":[11,19,45,58,113,141,165,175,181],"Twitter":[12,99],"enable":[13],"users":[14],"to":[15,33,52,83,110,132,144],"communicate,":[16],"share":[17],"ideas,":[18],"exchange":[20],"information":[21,59],"within":[22],"virtual":[23],"networks.":[24],"The":[25,93,125],"widespread":[26],"use":[27],"of":[28,115,152,183],"multimedia\u2010based":[29],"applications":[30],"has":[31],"led":[32],"a":[34,98],"substantial":[35],"increase":[36],"in":[37,86,155],"social":[38,189],"media":[39],"traffic,":[40],"often":[41],"containing":[42],"sensitive":[43],"personal":[44],"interaction":[46],"data.":[47],"These":[48],"data":[49,91,167],"are":[50],"vulnerable":[51],"security":[53],"threats,":[54],"including":[55],"identity":[56,161],"theft":[57],"misuse,":[60],"highlighting":[61],"the":[62,150,153,179,184],"need":[63],"for":[64,119,187],"effective":[65],"anomaly":[66],"detection":[67],"mechanisms.":[68],"This":[69],"research":[70],"proposes":[71],"an":[72],"enhanced":[73],"binary":[74],"spotted":[75],"hyena":[76],"optimized":[77],"dependent":[78],"linear":[79],"regression":[80],"(EBSHO\u2010DLR)":[81],"method":[82,127,154],"detect":[84],"anomalies":[85,112],"SM":[87],"networks,":[88],"ensuring":[89],"secure":[90],"transmission.":[92],"framework":[94],"begins":[95],"with":[96],"collecting":[97],"dataset":[100],"from":[101],"India,":[102],"followed":[103],"by":[104],"pre\u2010processing":[105],"using":[106],"Gaussian":[107],"blur":[108],"(GB)":[109],"filter":[111],"histogram":[114],"oriented":[116],"gradients":[117],"(HOG)":[118],"feature":[120],"extraction,":[121],"removing":[122],"irrelevant":[123],"information.":[124],"proposed":[126],"integrates":[128],"software\u2010defined":[129],"networking":[130],"(SDN)":[131],"provide":[133],"dynamic,":[134],"programmatically":[135],"efficient":[136],"network":[137],"management,":[138],"improving":[139],"performance":[140,170],"monitoring":[142],"compared":[143],"conventional":[145],"approaches.":[146],"Experimental":[147],"evaluation":[148],"demonstrates":[149],"effectiveness":[151],"detecting":[156],"fraudulent":[157],"activities":[158],"theft,":[162],"profile":[163],"cloning,":[164],"unauthorized":[166],"collection.":[168],"Key":[169],"metrics":[171],"include":[172],"precision":[173],"(96.7%)":[174],"accuracy":[176],"(97.8%),":[177],"confirming":[178],"robustness":[180],"reliability":[182],"EBSHO\u2010DLR":[185],"approach":[186],"securing":[188],"communication":[191],"systems.":[192]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2026-02-19T00:00:00"}
