Cargando…
Disrupting drive-by download networks on Twitter
This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure use...
Autores principales: | Javed, Amir, Ikwu, Ruth, Burnap, Pete, Giommoni, Luca, Williams, Matthew L. |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Vienna
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9391206/ https://www.ncbi.nlm.nih.gov/pubmed/36035378 http://dx.doi.org/10.1007/s13278-022-00944-2 |
Ejemplares similares
-
Us and them: identifying cyber hate on Twitter across multiple protected characteristics
por: Burnap, Pete, et al.
Publicado: (2016) -
Towards an Ethical Framework for Publishing Twitter Data in Social Research: Taking into Account Users’ Views, Online Context and Algorithmic Estimation
por: Williams, Matthew L, et al.
Publicado: (2017) -
Who Tweets? Deriving the Demographic Characteristics of Age, Occupation and Social Class from Twitter User Meta-Data
por: Sloan, Luke, et al.
Publicado: (2015) -
Analysing the connectivity and communication of suicidal users on twitter
por: Colombo, Gualtiero B., et al.
Publicado: (2016) -
Multi-class machine classification of suicide-related communication on Twitter
por: Burnap, Pete, et al.
Publicado: (2017)