[PDF][PDF] Compa: Detecting compromised accounts on social networks.

M Egele, G Stringhini, C Kruegel, G Vigna - NDSS, 2013 - ucl.ac.uk
As social networking sites have risen in popularity, cyber-criminals started to exploit these
sites to spread malware and to carry out scams. Previous work has extensively studied the …

Detecting clusters of fake accounts in online social networks

C Xiao, DM Freeman, T Hwa - Proceedings of the 8th ACM Workshop on …, 2015 - dl.acm.org
Fake accounts are a preferred means for malicious users of online social networks to send
spam, commit fraud, or otherwise abuse the system. A single malicious actor may create …

Poised: Spotting twitter spam off the beaten paths

S Nilizadeh, F Labrèche, A Sedighian, A Zand… - Proceedings of the …, 2017 - dl.acm.org
Cybercriminals have found in online social networks a propitious medium to spread spam
and malicious content. Existing techniques for detecting spam include predicting the …

Towards detecting compromised accounts on social networks

M Egele, G Stringhini, C Kruegel… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Compromising social network accounts has become a profitable course of action for
cybercriminals. By hijacking control of a popular media or business account, attackers can …

Malicious accounts: Dark of the social networks

KS Adewole, NB Anuar, A Kamsin, KD Varathan… - Journal of Network and …, 2017 - Elsevier
Over the last few years, online social networks (OSNs), such as Facebook, Twitter and
Tuenti, have experienced exponential growth in both profile registrations and social …

" Sorry, I was hacked" a classification of compromised twitter accounts

E Zangerle, G Specht - Proceedings of the 29th annual acm symposium …, 2014 - dl.acm.org
Online social networks like Facebook or Twitter have become powerful information diffusion
platforms as they have attracted hundreds of millions of users. The possibility of reaching …

Detecting spammers on social networks

G Stringhini, C Kruegel, G Vigna - … of the 26th annual computer security …, 2010 - dl.acm.org
Social networking has become a popular way for users to meet and interact online. Users
spend a significant amount of time on popular social network platforms (such as Facebook …

Uncovering large groups of active malicious accounts in online social networks

Q Cao, X Yang, J Yu, C Palow - Proceedings of the 2014 ACM SIGSAC …, 2014 - dl.acm.org
The success of online social networks has attracted a constant interest in attacking and
exploiting them. Attackers usually control malicious accounts, including both fake and …

Detecting and characterizing social spam campaigns

H Gao, J Hu, C Wilson, Z Li, Y Chen… - Proceedings of the 10th …, 2010 - dl.acm.org
Online social networks (OSNs) are popular collaboration and communication tools for
millions of users and their friends. Unfortunately, in the wrong hands, they are also effective …

Copycatch: stopping group attacks by spotting lockstep behavior in social networks

A Beutel, W Xu, V Guruswami, C Palow… - Proceedings of the 22nd …, 2013 - dl.acm.org
How can web services that depend on user generated content discern fraudulent input by
spammers from legitimate input? In this paper we focus on the social network Facebook and …