Filters








25,844 Hits in 4.3 sec

Forensic Analysis of Social Media Apps

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this paper we are conducting forensic analysis on different networking sites such as Twitter, Skype, and WhatsApp on famous search engine called Firefox.  ...  In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood.  ...  on twitter like logging in, searching for user, following users, messaging to particular user posting tweet on timeline and liking the tweet. .  ... 
doi:10.35940/ijitee.a5205.119119 fatcat:7rvxhoc5inb2dbk3btbdrzyx5u

Discovering Hidden Networks in On-line Social Networks

Pooja Wadhwa, M.P.S Bhatia
2014 International Journal of Intelligent Systems and Applications  
Identifying messages relevant to the domain of security can serve as a stepping stone in criminal network analysis.  ...  The message is vectorized according to the security dictionaries and is termed as ‗Security Vector'. The documents are classified in categories on the basis of security associations.  ...  The document/ message is vectorized according to the security dictionaries and is termed as ‗Security Vector'. The docu ments are classified in categories on the basis of security associations.  ... 
doi:10.5815/ijisa.2014.05.04 fatcat:licdbk2bdbdezjrvdvqhpss7ja

Social Media and Communication by Scientists:M. S. Swaminathan on Twitter

B. Jayashree
2018 Current Science  
From March 2015, for a period of one year, his use of social media platform Twitter is being taken up as a case study of social media communication by scientists.  ...  Hailed as one of three most influential Indians of the 20th century by Time Magazine 1 , renowned agriculture scientist M. S. Swaminathan has written prolifically in scientific and mainstream media.  ...  Methodology Quantitative and qualitative analysis of Swaminathan's Twitter messages over a one-year period was carried out, studying their direct or indirect effect to understand the link between science  ... 
doi:10.18520/cs/v114/i09/1840-1845 fatcat:3rsqw4j6sne4tihemur5zk64am

Uncovering Social Spammers -Evaluation And Detection

Geethu Thrippathy
2019 International Journal of Networks and Systems  
Behavioural analysis of each account has taken in order to get the normal behaviour of an account.  ...  Across the globe well known sites have millions of users and they suffer from a lot of security privacy and threats like profile cloning viral marketing rupture of security etc.  ...  On that basis if any unexpected entering occurred in the system, security measures will have taken into account. Sometimes the source of message can be used as security measure.  ... 
doi:10.30534/ijns/2019/24832019 fatcat:up2kl77lffb4fl3xvyd2pxqxtu

Developing a forensics tool for social media

Theodore Casser, Mohammed Ketel
2014 Proceedings of the 2014 ACM Southeast Regional Conference on - ACM SE '14  
These same messages can be used to construct a digital and physical path that can be extracted for forensic analysis through application programming interfaces provided by each of the social media outlets  ...  Millions of users around the world utilize social media sites on any given day, spreading information about their activities, whereabouts and thoughts to friends and interested readers.  ...  Twitter as well, and users on Twitter and Facebook often cross-post their information between the services.  ... 
doi:10.1145/2638404.2638491 dblp:conf/ACMse/CasserK14 fatcat:tcuvqpmixfexzfqlpmogj6vn5i

Advanced Characteristic Analysis of Real Time Junk Occurrences in Twitter

Ancy S, Aruna Jasmine.J
2018 International Journal of Computer Applications Technology and Research  
Spam on twitter is a major threat in recent days. To overcome these problems we take many steps to work on this. This work uses twitter as the input data source to address the problem of real-time.  ...  In order to solve these problem, we firstly carry out a deep analysis on the statistical features of taking training sets of data to differentiate spam tweet and non-spam tweet.  ...  In this paper, we perform an empirical analysis of the cyber criminal ecosystem on Twitter.  ... 
doi:10.7753/ijcatr0712.1001 fatcat:3aknsycxardtbdvp2umy6wdja4

Towards Detecting Compromised Accounts on Social Networks

Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna
2017 IEEE Transactions on Dependable and Secure Computing  
By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base.  ...  The impacts of these incidents range from a tarnished reputation to multi-billion dollar monetary losses on financial markets.  ...  , by aggregating together similar malicious messages.  ... 
doi:10.1109/tdsc.2015.2479616 fatcat:fpqrpuzisbhblbfxildo24ldm4

Malaysian Lifelogging over Twitter

Mohammad Arshi Saloot, Norisma Idris, Rohana Mahmud
2013 2013 1st International Conference on Artificial Intelligence, Modelling and Simulation  
Twitter can be used to exchange a variety of data such as sensitive data, political news, commercial messages, real-time events, and lifelogging.  ...  These messages were analyzed to assess the extent of their lifelogging activity according to two main aspects: 1) geolocation of users; and 2) subject of messages.  ...  ACKNOWLEDGMENT We gratefully acknowledge the University of Malaya for supporting this research through UMRG Grant (RG089/12ICT).  ... 
doi:10.1109/aims.2013.27 fatcat:m5pbhjl7tbhudjjz3xpfyxhbaa

Peace vs. Privacy

Mohammad Mannan, Arash Shahkar, Atieh Saberi Pirouz, Vladimir Rabotka
2015 Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15  
Our implementation consists of a Thunderbird add-on and a Twitter app; the add-on is available at: https://madiba.encs.concordia.ca/software.html.  ...  In this paper, the focus of our discussion includes: the paradigm of security through hostility, and the design, implementation and security analysis of the proposed encrypted email solution.  ...  NSPW 2015, and members of Concordia's Madiba Security Research Group; we thank them all.  ... 
doi:10.1145/2841113.2841123 dblp:conf/nspw/MannanSPR15 fatcat:tkwlv5z4ajf5bj4olnsu4exngq

#h00t: Censorship Resistant Microblogging [article]

Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew Wright
2011 arXiv   pre-print
with one another.  ...  Microblogging services such as Twitter are an increasingly important way to communicate, both for individuals and for groups through the use of hashtags that denote topics of conversation.  ...  Security analysis Based on the threat model defined in Section 2.1 and the system design goals described in Section 2.2, we now analyze the security of the proposed #h00t protocol. Message security.  ... 
arXiv:1109.6874v1 fatcat:thwqvgfs2nfrzfxaikprsb74kq

Blood and Security during the Norway Attacks: Authorities' Twitter Activity and Silence [chapter]

Rune Ottosen, Steen Steensen
2018 Social Media Use in Crisis and Risk Communication  
Our findings show that the Norwegian authorities were almost completely absent on Twitter during the critical hours of the terrorist attack, and that there was no coordination and synchronisation of communication  ...  This chapter analyses the Norwegian authorities' presence on Twitter during the 22 July 2011 terrorist attacks.  ...  Red Cross and Red Crescent content analysis of the Norwegian Twitter-sphere on 22 July 2011; (2) qualitative text analysis of the Twitter communication involving the Norwegian Security Police and Oslo  ... 
doi:10.1108/978-1-78756-269-120181008 fatcat:njbdp566bnhrpozveqn43lj3ua

Closing the Citizen-Government Communication Gap: Content, Audience, and Network Analysis of Government Tweets

Clayton Wukich, Ines Mergel
2015 Journal of Homeland Security and Emergency Management  
This article addresses each phase of emergency management through the analysis of Twitter messages posted over a 3-month period.  ...  Our research demonstrates that while most messages conformed to traditional one-to-many government communication tactics, a number of agencies employed interactive approaches including one-to-one and many-to-many  ...  Agency* Twitter Handle  ... 
doi:10.1515/jhsem-2014-0074 fatcat:b2427rwnybdtzluzgqocazqgpy

Spam Detection on Online Social Media Networks

G N.V.G. Sirisha, G V.Padma Raju, G Amruta
2018 International Journal of Engineering & Technology  
Spam profiles are becoming major security threat used by cyber criminals and also a source of unwanted ads. Twitter is one among several social networking sites which are expanding on daily basis.  ...  Spam detection in twitter has become one of the major problems these days. A twitter spam account user nature is analyzed with a target to improve detection of social spam.  ...  Depending on the security policy of Twitter, to provide the detection of spam a different features based on graph and message-based features are designed.  ... 
doi:10.14419/ijet.v7i2.7.10896 fatcat:bmwqnee2frhl3fursxgakycosu

Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies [article]

Mohd Najwadi Yusoff, Ali Dehghantanha, Ramlan Mahmod
2017 arXiv   pre-print
In this chapter, we detect and analyze residual network traffic artefacts of Firefox OS in relation to two popular social networking applications (Facebook and Twitter) and one instant messaging application  ...  This paper as the first focused study on mobile Firefox OS network traffic analysis should pave the way for the future research in this direction.  ...  In this paper, we have successfully presented the network analysis of two popular social networking applications (Facebook and Twitter) and one instant messaging application (Telegram) on FxOS.  ... 
arXiv:1706.08056v1 fatcat:iypnejq67vg3jkqytt7gqbrga4

Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya

Tomer Simon, Avishay Goldberg, Limor Aharonson-Daniel, Dmitry Leykin, Bruria Adini, Vineet Gupta
2014 PLoS ONE  
Threat assessment was updated through the information posted on social media. Security breaches led to the relay of sensitive data. At times, misinformation was only corrected after two days.  ...  The abundance of Twitter accounts providing official information made it difficult to synchronize and follow the flow of information.  ...  Kenya's Ministry of Interior used its Twitter accounts 1,533 times while not posting a single message on their Facebook page.  ... 
doi:10.1371/journal.pone.0104136 pmid:25153889 pmcid:PMC4143241 fatcat:n7vafb3xgjdcln7obvgznu2yvi
« Previous Showing results 1 — 15 out of 25,844 results