{"id":"https://openalex.org/W2892335496","doi":"https://doi.org/10.1145/3230467.3230475","title":"Recognition Based Mechanism to Detect Malicious Content in Social Networks","display_name":"Recognition Based Mechanism to Detect Malicious Content in Social Networks","publication_year":2018,"publication_date":"2018-05-21","ids":{"openalex":"https://openalex.org/W2892335496","doi":"https://doi.org/10.1145/3230467.3230475","mag":"2892335496"},"language":"en","primary_location":{"id":"doi:10.1145/3230467.3230475","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230467.3230475","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 International Conference on E-business and Mobile Commerce","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020719901","display_name":"Fatna El Mendili","orcid":"https://orcid.org/0000-0002-7428-6502"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Fatna Elmendili","raw_affiliation_strings":["Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058321868","display_name":"Habiba Chaoui","orcid":"https://orcid.org/0000-0001-8892-9612"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Habiba Chaoui","raw_affiliation_strings":["Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059771112","display_name":"Youn\u00e8s El Bouzekri El Idrissi","orcid":"https://orcid.org/0000-0003-4018-437X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Youn\u00e8s El Bouzekri El Idrissi","raw_affiliation_strings":["Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020719901"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12513583,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":null,"first_page":"50","last_page":"54"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7569453120231628},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.673172116279602},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6017702221870422},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5653221607208252},{"id":"https://openalex.org/keywords/content","display_name":"Content (measure theory)","score":0.5447954535484314},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5296915173530579},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.485768586397171},{"id":"https://openalex.org/keywords/user-generated-content","display_name":"User-generated content","score":0.44072216749191284},{"id":"https://openalex.org/keywords/witness","display_name":"Witness","score":0.4213648736476898},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4195564389228821},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4147999882698059},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3211989998817444},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07970491051673889}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7569453120231628},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.673172116279602},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6017702221870422},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5653221607208252},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.5447954535484314},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5296915173530579},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.485768586397171},{"id":"https://openalex.org/C101293273","wikidata":"https://www.wikidata.org/wiki/Q579716","display_name":"User-generated content","level":3,"score":0.44072216749191284},{"id":"https://openalex.org/C2776900844","wikidata":"https://www.wikidata.org/wiki/Q8028383","display_name":"Witness","level":2,"score":0.4213648736476898},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4195564389228821},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4147999882698059},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3211989998817444},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07970491051673889},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3230467.3230475","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3230467.3230475","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 International Conference on E-business and Mobile Commerce","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"display_name":"No poverty","id":"https://metadata.un.org/sdg/1"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W88014687","https://openalex.org/W1970433929","https://openalex.org/W2131485284"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2030628044","https://openalex.org/W2772709740","https://openalex.org/W92751545","https://openalex.org/W4295709008","https://openalex.org/W3183611733","https://openalex.org/W2901542937","https://openalex.org/W4390017791","https://openalex.org/W1574459091"],"abstract_inverted_index":{"In":[0,109],"the":[1,8,18,22,45,77,97,106,126,135,138,145,152,170,174,182,192,198],"past":[2],"six":[3],"years,":[4],"tremendous":[5],"growth":[6],"in":[7,36,44,105,158,189],"size":[9],"and":[10,30,72,100,143,202],"popularity":[11],"of":[12,53,88,91,128,137,172,176,184,194,200],"social":[13,25,83,122],"networking":[14],"has":[15],"fundamentally":[16],"changed":[17],"way":[19],"to":[20,117,133,151,155,180],"use":[21],"Internet.":[23],"Online":[24],"media":[26,84],"services":[27],"like":[28,57,69],"Facebook":[29],"Twitter":[31],"witness":[32],"an":[33,40,102],"exponential":[34],"increase":[35],"user":[37,98],"activity":[38,49],"when":[39],"event":[41],"takes":[42],"place":[43],"real":[46,107],"world.":[47,108],"This":[48],"is":[50,179,197],"a":[51,85,114,190],"combination":[52],"good":[54],"quality":[55,67,79,93],"content":[56,68,94,120,139,154,186,201],"information,":[58,89],"personal":[59],"views,":[60],"opinions,":[61],"comments,":[62],"as":[63,65],"well":[64],"poor":[66,92],"rumors,":[70],"spam,":[71],"other":[73],"malicious":[74,119,185],"contents.":[75],"Although":[76],"best":[78],"contents":[80,147],"makes":[81],"online":[82],"rich":[86],"source":[87],"consumption":[90],"can":[95],"degrade":[96],"experience":[99],"have":[101],"inappropriate":[103],"impact":[104],"this":[110],"paper,":[111],"we":[112],"propose":[113],"new":[115],"approach":[116],"detect":[118],"on":[121],"networks,":[123],"while":[124],"using":[125],"module":[127,167],"filtering":[129,207],"processes":[130],"by":[131,206,208],"content,":[132,162],"calculate":[134],"frequencies":[136],"entered":[140],"into":[141],"parameter":[142],"extract":[144],"entire":[146],"which":[148],"are":[149],"similar":[150,204],"chosen":[153],"classify":[156],"them":[157],"two":[159],"classes":[160],"{malicious":[161],"legitimate":[163],"content}.":[164],"The":[165],"recognition":[166,199],"will":[168],"be":[169],"subject":[171],"performing":[173],"phase":[175,193],"spread":[177],"that":[178],"make":[181],"learning":[183],"already":[187],"inserted":[188],"database,":[191],"back":[195],"propagation":[196],"their":[203],"given":[205],"content.":[209]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
