{"id":"https://openalex.org/W3127808317","doi":"https://doi.org/10.1109/snams52053.2020.9336572","title":"A new approach for the detection and analysis of phishing in social networks: the case of Twitter","display_name":"A new approach for the detection and analysis of phishing in social networks: the case of Twitter","publication_year":2020,"publication_date":"2020-12-14","ids":{"openalex":"https://openalex.org/W3127808317","doi":"https://doi.org/10.1109/snams52053.2020.9336572","mag":"3127808317"},"language":"en","primary_location":{"id":"doi:10.1109/snams52053.2020.9336572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snams52053.2020.9336572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067379291","display_name":"kamel Ahsene Djaballah","orcid":null},"institutions":[{"id":"https://openalex.org/I157169809","display_name":"University of Sciences and Technology Houari Boumediene","ror":"https://ror.org/02kb89c09","country_code":"DZ","type":"education","lineage":["https://openalex.org/I157169809"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Kamel Ahsene Djaballah","raw_affiliation_strings":["University Science and Technology Houari Boumediene,Algiers,Algeria","University Science and Technology Houari Boumediene, Algiers, Algeria"],"affiliations":[{"raw_affiliation_string":"University Science and Technology Houari Boumediene,Algiers,Algeria","institution_ids":["https://openalex.org/I157169809"]},{"raw_affiliation_string":"University Science and Technology Houari Boumediene, Algiers, Algeria","institution_ids":["https://openalex.org/I157169809"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019747586","display_name":"Kamel Boukhalfa","orcid":"https://orcid.org/0000-0002-9746-579X"},"institutions":[{"id":"https://openalex.org/I157169809","display_name":"University of Sciences and Technology Houari Boumediene","ror":"https://ror.org/02kb89c09","country_code":"DZ","type":"education","lineage":["https://openalex.org/I157169809"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Kamel Boukhalfa","raw_affiliation_strings":["University Science and Technology Houari Boumediene,Algiers,Algeria","University Science and Technology Houari Boumediene, Algiers, Algeria"],"affiliations":[{"raw_affiliation_string":"University Science and Technology Houari Boumediene,Algiers,Algeria","institution_ids":["https://openalex.org/I157169809"]},{"raw_affiliation_string":"University Science and Technology Houari Boumediene, Algiers, Algeria","institution_ids":["https://openalex.org/I157169809"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079422347","display_name":"Zakaria Ghalem","orcid":null},"institutions":[{"id":"https://openalex.org/I157169809","display_name":"University of Sciences and Technology Houari Boumediene","ror":"https://ror.org/02kb89c09","country_code":"DZ","type":"education","lineage":["https://openalex.org/I157169809"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Zakaria Ghalem","raw_affiliation_strings":["University Science and Technology Houari Boumediene,Algiers,Algeria","University Science and Technology Houari Boumediene, Algiers, Algeria"],"affiliations":[{"raw_affiliation_string":"University Science and Technology Houari Boumediene,Algiers,Algeria","institution_ids":["https://openalex.org/I157169809"]},{"raw_affiliation_string":"University Science and Technology Houari Boumediene, Algiers, Algeria","institution_ids":["https://openalex.org/I157169809"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033504354","display_name":"Oussama Boukerma","orcid":null},"institutions":[{"id":"https://openalex.org/I157169809","display_name":"University of Sciences and Technology Houari Boumediene","ror":"https://ror.org/02kb89c09","country_code":"DZ","type":"education","lineage":["https://openalex.org/I157169809"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Oussama Boukerma","raw_affiliation_strings":["University Science and Technology Houari Boumediene,Algiers,Algeria","University Science and Technology Houari Boumediene, Algiers, Algeria"],"affiliations":[{"raw_affiliation_string":"University Science and Technology Houari Boumediene,Algiers,Algeria","institution_ids":["https://openalex.org/I157169809"]},{"raw_affiliation_string":"University Science and Technology Houari Boumediene, Algiers, Algeria","institution_ids":["https://openalex.org/I157169809"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067379291"],"corresponding_institution_ids":["https://openalex.org/I157169809"],"apc_list":null,"apc_paid":null,"fwci":3.4697,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.94014709,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9705070853233337},{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.9160171747207642},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.810373067855835},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.7442718744277954},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.630358099937439},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5638327598571777},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5218895077705383},{"id":"https://openalex.org/keywords/blacklisting","display_name":"Blacklisting","score":0.478797048330307},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.47716206312179565},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46556544303894043},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.45617836713790894},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3715173602104187},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3519529104232788},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3324234187602997},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08050400018692017}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9705070853233337},{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.9160171747207642},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.810373067855835},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.7442718744277954},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.630358099937439},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5638327598571777},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5218895077705383},{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.478797048330307},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.47716206312179565},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46556544303894043},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.45617836713790894},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3715173602104187},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3519529104232788},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3324234187602997},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08050400018692017}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/snams52053.2020.9336572","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snams52053.2020.9336572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"},{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W127363646","https://openalex.org/W1526831942","https://openalex.org/W1999101254","https://openalex.org/W2051480149","https://openalex.org/W2052427829","https://openalex.org/W2055597027","https://openalex.org/W2121990650","https://openalex.org/W2146729596","https://openalex.org/W2335041295","https://openalex.org/W2491512594","https://openalex.org/W2544613100","https://openalex.org/W2797672282","https://openalex.org/W2806379428","https://openalex.org/W2917600487","https://openalex.org/W6722891394"],"related_works":["https://openalex.org/W2933056782","https://openalex.org/W4281884841","https://openalex.org/W2017968904","https://openalex.org/W1593211785","https://openalex.org/W3207470445","https://openalex.org/W2183312460","https://openalex.org/W4313492216","https://openalex.org/W2005813008","https://openalex.org/W3215769141","https://openalex.org/W3033830493"],"abstract_inverted_index":{"Cybercriminals":[0],"use":[1],"Internet":[2],"and":[3,29,85,151,189],"social":[4,98],"networks":[5],"as":[6],"a":[7,49,77,106,157],"vector":[8,149],"to":[9,15,18,61,65,95,104,122,159,171],"launch":[10],"phishing":[11,55,88,179],"attacks":[12],"in":[13,53,110,193],"order":[14],"lure":[16],"victims":[17],"disclose":[19],"personal":[20],"information.":[21],"There":[22],"are":[23,38,176],"several":[24,96],"methods":[25,46,64],"for":[26,82,199],"the":[27,35,67,83,113,138,178,194,200],"detection":[28,84],"analysis":[30,86,127],"of":[31,51,69,87,112,196],"these":[32,45,70],"attacks,":[33],"among":[34],"most":[36],"used":[37,143],"those":[39],"based":[40,164],"on":[41,89,165,186],"machine":[42,129,166],"learning.":[43],"However,":[44],"suffer":[47],"from":[48],"lack":[50],"precision":[52],"detecting":[54],"attacks.":[56,71,180],"Therefore,":[57],"it":[58,192],"is":[59,103],"necessary":[60],"propose":[62],"new":[63,133],"improve":[66],"predictions":[68],"In":[72,135],"this":[73,136],"article,":[74],"we":[75,120,155,182],"propone":[76],"three":[78,139],"(03)":[79],"step":[80,102,137],"approach":[81],"Twitter,":[90],"which":[91],"can":[92],"be":[93],"applied":[94],"other":[97],"networks.":[99],"The":[100],"first":[101],"browse":[105],"database":[107],"called":[108],"\u201cBlacklist\u201d":[109],"search":[111],"suspicious":[114],"URL":[115,123],"(Uniform":[116,124],"Resource":[117,125],"Locator).":[118],"Subsequently,":[119],"proceed":[121],"Locator)":[126],"leveraging":[128],"learning":[130],"techniques":[131],"introducing":[132],"features.":[134],"following":[140],"classifiers":[141],"were":[142],"namely,":[144],"Regression":[145],"Logistics,":[146],"SVM":[147],"(Support":[148],"Machine)":[150],"Random":[152],"Forest.":[153],"Afterwards,":[154],"added":[156],"module":[158],"analyze":[160],"Twitter":[161],"accounts,":[162],"also":[163],"learning,":[167],"using":[168],"user-related":[169],"features":[170],"detect":[172],"malicious":[173],"twitters":[174],"who":[175],"causing":[177],"Finally,":[181],"tested":[183],"our":[184],"system":[185],"real":[187],"data":[188],"then":[190],"implemented":[191],"form":[195],"an":[197],"application":[198],"end":[201],"users.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
