{"id":"https://openalex.org/W4386246812","doi":"https://doi.org/10.1109/icit58056.2023.10226010","title":"OSINT-Based Tool for Social Media User Impersonation Detection Through Machine Learning","display_name":"OSINT-Based Tool for Social Media User Impersonation Detection Through Machine Learning","publication_year":2023,"publication_date":"2023-08-09","ids":{"openalex":"https://openalex.org/W4386246812","doi":"https://doi.org/10.1109/icit58056.2023.10226010"},"language":"en","primary_location":{"id":"doi:10.1109/icit58056.2023.10226010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit58056.2023.10226010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Information Technology (ICIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011506716","display_name":"Rajaa Alqudah","orcid":"https://orcid.org/0000-0002-9572-9739"},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Rajaa Alqudah","raw_affiliation_strings":["King Abdullah II School of Engineering, Princess Sumaya University for Technology,Amman,Jordan","King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Engineering, Princess Sumaya University for Technology,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]},{"raw_affiliation_string":"King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077592704","display_name":"Mohammed Al-Qaisi","orcid":null},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mohammed Al-Qaisi","raw_affiliation_strings":["King Abdullah II School of Engineering, Princess Sumaya University for Technology,Amman,Jordan","King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Engineering, Princess Sumaya University for Technology,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]},{"raw_affiliation_string":"King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092814933","display_name":"Rakan Ammari","orcid":null},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Rakan Ammari","raw_affiliation_strings":["King Abdullah II School of Engineering, Princess Sumaya University for Technology,Amman,Jordan","King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Engineering, Princess Sumaya University for Technology,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]},{"raw_affiliation_string":"King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5092814934","display_name":"Yazan Abu Ta'a","orcid":null},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Yazan Abu Ta'a","raw_affiliation_strings":["King Abdullah II School of Engineering, Princess Sumaya University for Technology,Amman,Jordan","King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"King Abdullah II School of Engineering, Princess Sumaya University for Technology,Amman,Jordan","institution_ids":["https://openalex.org/I158749337"]},{"raw_affiliation_string":"King Abdullah II School of Engineering, Princess Sumaya University for Technology, Amman, Jordan","institution_ids":["https://openalex.org/I158749337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011506716"],"corresponding_institution_ids":["https://openalex.org/I158749337"],"apc_list":null,"apc_paid":null,"fwci":2.2973,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.90478982,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"752","last_page":"757"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.8152409791946411},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.7841163873672485},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7579070925712585},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6417063474655151},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5908082723617554},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5634694695472717},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.545985758304596},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.5387749075889587},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4915235936641693},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.4704258441925049},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4439700245857239},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.4204111397266388},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.4188840091228485},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3402370512485504}],"concepts":[{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.8152409791946411},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.7841163873672485},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7579070925712585},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6417063474655151},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5908082723617554},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5634694695472717},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.545985758304596},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.5387749075889587},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4915235936641693},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.4704258441925049},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4439700245857239},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.4204111397266388},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.4188840091228485},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3402370512485504},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icit58056.2023.10226010","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icit58056.2023.10226010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Information Technology (ICIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1997816329","https://openalex.org/W1999533590","https://openalex.org/W2153728012","https://openalex.org/W2548146513","https://openalex.org/W2564649569","https://openalex.org/W2811491964","https://openalex.org/W2928632250","https://openalex.org/W2981232822","https://openalex.org/W3000208506","https://openalex.org/W3020862983","https://openalex.org/W3091074842","https://openalex.org/W3092367696","https://openalex.org/W3100231621","https://openalex.org/W4200146754","https://openalex.org/W4200511228","https://openalex.org/W4213034955","https://openalex.org/W6729630714"],"related_works":["https://openalex.org/W1648378477","https://openalex.org/W2032900633","https://openalex.org/W1559396486","https://openalex.org/W3214845967","https://openalex.org/W4387348233","https://openalex.org/W197818113","https://openalex.org/W4382995152","https://openalex.org/W2982160180","https://openalex.org/W158711604","https://openalex.org/W2911255625"],"abstract_inverted_index":{"With":[0],"the":[1,59,74,123,153,159,162],"explosion":[2],"of":[3,173,180],"social":[4,23,43,49,70,134],"media":[5,24,50,71,135],"platform":[6,90],"usage":[7],"in":[8,116],"recent":[9],"years,":[10],"privacy":[11],"and":[12,56,77,95,112,118,129,138,140,164,177,182],"online":[13],"security":[14],"have":[15],"become":[16],"major":[17],"concerns.":[18],"Malicious":[19,65],"users":[20,66],"create":[21,68],"fake":[22,69],"profiles,":[25],"posing":[26],"as":[27,53,80],"regular":[28],"people":[29],"or":[30,39,152,158],"public":[31],"figures":[32],"to":[33,93,100],"gather":[34],"personal":[35],"information,":[36],"damage":[37],"reputations,":[38],"show":[40],"off":[41],"their":[42],"engineering":[44],"skills.":[45],"As":[46],"a":[47,147,156,165],"result,":[48],"platforms,":[51],"such":[52],"Facebook,":[54],"Instagram,":[55],"others,":[57],"provide":[58],"perfect":[60],"place":[61],"for":[62,126],"identity":[63],"theft.":[64],"can":[67,119],"profiles":[72,144],"with":[73,155,161,175],"same":[75],"name":[76,163],"profile":[78],"image":[79],"another":[81],"person.":[82],"In":[83],"this":[84],"paper,":[85],"Open":[86],"Source":[87],"Intelligence":[88],"(OSINT)":[89],"is":[91],"used":[92],"collect":[94],"analyze":[96],"publicly":[97],"available":[98],"information":[99],"identify":[101],"potential":[102,142],"impersonators.":[103],"The":[104,167],"proposed":[105,168],"approach":[106],"employs":[107],"web":[108,113],"scraping,":[109],"machine":[110],"learning,":[111],"development":[114],"modules":[115],"Python":[117],"be":[120],"hosted":[121],"on":[122,146],"AWS":[124],"cloud":[125],"optimal":[127],"performance":[128],"scalability.":[130],"It":[131],"accurately":[132],"scrapes":[133],"platforms":[136],"(Facebook":[137],"Instagram)":[139],"presents":[141],"impostor":[143],"based":[145],"user's":[148],"uploaded":[149],"photo":[150,154,160],"only,":[151],"name,":[157],"username.":[166],"model":[169],"achieved":[170],"an":[171],"accuracy":[172],"88%":[174],"precision":[176],"recall":[178],"matrices":[179],"86%":[181],"89%":[183],"respectively.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
