Fake news propagation: A review of epidemic models, datasets, and insights

S Raponi, Z Khalifa, G Oligeri, R Di Pietro - ACM Transactions on the …, 2022 - dl.acm.org
Fake news propagation is a complex phenomenon influenced by a multitude of factors
whose identification and impact assessment is challenging. Although many models have …

The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19

AF Al‐Qahtani, S Cresci - IET Information Security, 2022 - Wiley Online Library
The COVID‐19 pandemic coincided with an equally‐threatening scamdemic: a global
epidemic of scams and frauds. The unprecedented cybersecurity concerns emerged during …

Metaverse: Security and privacy issues

R Di Pietro, S Cresci - … conference on trust, privacy and security …, 2021 - ieeexplore.ieee.org
The metaverse promises a host of bright opportunities for business, economics, and society.
Though, a number of critical aspects are still to be considered and the analysis of their …

Make reddit great again: assessing community effects of moderation interventions on r/the_donald

A Trujillo, S Cresci - Proceedings of the ACM on Human-computer …, 2022 - dl.acm.org
The subreddit r/The_Donald was repeatedly denounced as a toxic and misbehaving online
community, reasons for which it faced a sequence of moderation interventions by Reddit …

[HTML][HTML] Financial transactions using fintech during the COVID-19 crisis in Bulgaria

I Vasenska, P Dimitrov, B Koyundzhiyska-Davidkova… - Risks, 2021 - mdpi.com
In the context of current crises following COVID-19 and growing global economic
uncertainties, the issues regarding financial transactions with FINTECH are increasingly …

How China's cognitive warfare works: A frontline perspective of Taiwan's anti-disinformation wars

TC Hung, TW Hung - Journal of Global Security Studies, 2022 - academic.oup.com
Cognitive warfare—controlling others' mental states and behaviors by manipulating
environmental stimuli—is a significant and ever-evolving issue in global conflict and …

[HTML][HTML] Cryptomining makes noise: Detecting cryptojacking via machine learning

M Caprolu, S Raponi, G Oligeri, R Di Pietro - Computer Communications, 2021 - Elsevier
Cryptojacking occurs when an adversary illicitly runs crypto-mining software over the
devices of unaware users. This novel cybersecurity attack, that is emerging in both the …

Deepfakes: An integrative review of the literature and an agenda for future research

PN Vasist, S Krishnan - … of the Association for Information Systems, 2022 - aisel.aisnet.org
We are witnessing a growing concern around the impact of hyper-realistic synthetic media
and its dissemination in what is widely known as" deepfakes." However, the phenomenon's …

The spread of propaganda by coordinated communities on social media

K Hristakieva, S Cresci, G Da San Martino… - Proceedings of the 14th …, 2022 - dl.acm.org
Large-scale manipulations on social media have two important characteristics:(i) they use
propaganda to influence others, and (ii) they adopt coordinated behavior to spread …

Temporal dynamics of coordinated online behavior: Stability, archetypes, and influence

S Tardelli, L Nizzoli, M Tesconi… - Proceedings of the …, 2024 - National Acad Sciences
Large-scale online campaigns, malicious or otherwise, require a significant degree of
coordination among participants, which sparked interest in the study of coordinated online …