Filters








3,299 Hits in 5.6 sec

Feature extractions and selection of bot detection on Twitter A systematic literature review

Raad Al-azawi, Safaa O. AL-mamory
2022 Inteligencia Artificial  
To the best of our knowledge, this study is the first systematic literature review based on a preset search-strategy that encompasses literature published between 2018 and 2021 which are concerned with  ...  While researchers develop a variety of methods to detect social media bot accounts, attackers adapt their bots to avoid detection.  ...  It is believed that this systematic review can help researchers, particularly those who are unfamiliar with Twitter bots in obtaining enough background on bot detection.  ... 
doi:10.4114/intartif.vol25iss69pp57-86 fatcat:6s4sejmlhjdvzaqu2hfijd5ysa

Social Engineering Attacks Prevention: A Systematic Literature Review

Wenni Syafitri, Zarina Shukur, Umi A. Mokhtar, Rossilawati Sulaiman, Muhammad Azwan Ibrahim
2022 IEEE Access  
We conducted a systematic literature review based on Bryman & Bell's literature review method.  ...  We present this systematic literature review to recommend ways to prevent social engineering attacks.  ...  The research question is the necessary factor of a systematic literature review.  ... 
doi:10.1109/access.2022.3162594 fatcat:y2t4jlbfprfyzfjdfro5r2wyt4

Use of Security Logs for Data Leak Detection: A Systematic Literature Review

Ricardo Ávila, Raphaël Khoury, Richard Khoury, Fábio Petrillo, Flavio Lombardi
2021 Security and Communication Networks  
This paper presents a systematic literature review on the use of security logs for data leak detection.  ...  Our findings are fourfold: (i) we propose a new classification of information leaks, which uses the GDPR principles; (ii) we identify the twenty most widely used publicly available datasets in threat detection  ...  In this paper, we present a Systematic Literature Review (SLR) of 33 published, peer-reviewed studies on the use of security logs to detect information leaks.  ... 
doi:10.1155/2021/6615899 fatcat:ung2fccx25cvdne2ey2u25btuu

Adaptive Rehabilitation Bots in Serious Games

Imad Afyouni, Abdullah Murad, Anas Einea
2020 Sensors  
A personalized and versatile gaming platform with embedded virtual assistants, called "Rehab bots", is created.  ...  Furthermore, the rehab bots employ a robust technique to adjust the workout difficulty level in real-time to match the patients' performance.  ...  A comprehensive review of developed serious games for learning and training purposes in immersive VR-environments was presented in [20] .  ... 
doi:10.3390/s20247037 pmid:33316916 fatcat:aqpao7o6efa35dosyzj3vuokzu

FingFormer: Contrastive Graph-based Finger Operation Transformer for Unsupervised Mobile Game Bot Detection

Wenbin Li, Xiaokai Chu, Yueyang Su, Di Yao, Shiwei Zhao, Runze Wu, Shize Zhang, Jianrong Tao, Hao Deng, Jingping Bi
2022 Proceedings of the ACM Web Conference 2022  
This paper studies the task of detecting bots for online mobile games.  ...  In detail, we introduce a Transformer-style detection model, namely FingFormer.  ...  The rest of this paper is organized as follows: Section 2 briefly reviews the previous works and compares the difference between PC game bot detection and mobile game bot detection.  ... 
doi:10.1145/3485447.3512272 fatcat:kdx3ygvokrd5lf22h34d7wa72i

A Systematic Literature Review on the Cyber Security

Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar, Anurag Kumar Jaiswal
2021 International Journal of Scientific Research and Management  
Cyber security isn't just a problem that affects individuals but it also applies to an organization or a government.  ...  Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace.  ...  A high-quality standalone literature review, according to Mathieu and Guy [34] , provides reliable information and insights into previous research, allowing other researchers to seek new directions on  ... 
doi:10.18535/ijsrm/v9i12.ec04 fatcat:bxrsidjhpngdxgllk5cpomoyxa

Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review

Emad Badawi, Guy-Vincent Jourdan
2020 IEEE Access  
Our analysis revealed that the literature contains a significant amount of research to detect and analyze several attack types, such as the high yield investment programs and pump and dump.  ...  We defined inclusion, exclusion, and quality of assessment criteria, and after a detailed review process, 66 publications were included in the final review.  ...  In this paper, we conduct a systematic literature review (SLR) on state-of-the-art cryptocurrency-related cybercriminal activities.  ... 
doi:10.1109/access.2020.3034816 fatcat:ewuxjgvxizeq3igq5dk6ohxoie

ICT enabled TVET education: a systematic literature review

Rana Hammad Hassan, Malik Tahir Hassan, Sheraz Naseer, Zafran Khan, Moongu Jeon
2021 IEEE Access  
She is a student of pre-medical 12 th standard and has a research interest in cancer diagnoses and treatment using Nano-Technology.  ...  data extraction, and (3.5) systematic review execution.  ...  These limited studies have been discussed with a focuse that how identified limitations/gaps can be used to bridge the gap in the scope of the current systematic literature review.  ... 
doi:10.1109/access.2021.3085910 fatcat:hpgpbyo6mvaevgykv3oqg5vuoe

A Systematic Literature Review and Taxonomy of Modern Code Review [article]

Nicole Davila, Ingrid Nunes
2021 arXiv   pre-print
Method: We performed a systematic literature review, selecting publications from four digital libraries. Results: A total of 139 papers were selected and analyzed in three main categories.  ...  Modern Code Review (MCR) is a widely known practice of software quality assurance. However, the existing body of knowledge of MCR is currently not understood as a whole.  ...  Systematic Literature Review To perform our systematic literature review (SLR), we followed the guidelines proposed by Kitchenham and Charters [20] .  ... 
arXiv:2103.08777v1 fatcat:fw2pzpj77jc3dkecqsauh7kaum

Cybercrime threat intelligence: A systematic multi-vocal literature review

Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel
2021 Computers & security  
R E F E R E N C E S Affinito, A., Botta, A., Garofalo, M., Ventre, G., 2018  ...  Given the extent of the phenomenon and the literature around it, we aim at accounting for both grey and white literature on the matter with a systematic multi-vocal literature review ( Garousi et al.,  ...  For the scope of this paper, and to maximize its validity, it follows a systematic approach based on the guidelines provided by ( Petersen et al., 2008 ) for conducting systematic literature reviews  ... 
doi:10.1016/j.cose.2021.102258 fatcat:43fk6zb6k5fx5jtj5a24bu3afi

Artificial Intelligence Applications in K-12 Education: A Systematic Literature Review

Mostafa Zafari, Jalal Safari Bazargani, Abolghasem Sadeghi-Niaraki, Soo-Mi Choi
2022 IEEE Access  
To this end, a systematic literature review was conducted on articles and conference papers published between 2011 and 2021 in the Web of Science and Scopus databases.  ...  Education is a vital part of the development of society and it is changing over time in terms of methods, content, concepts, and models.  ...  ACKNOWLEDGMENT This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.  ... 
doi:10.1109/access.2022.3179356 fatcat:lmma5q4ubzho5bphj77n7ay5ky

Twitter and Research: A Systematic Literature Review Through Text Mining

Amir Karami, Morgan Lundy, Frank Webb, Yogesh K. Dwivedi.
2020 IEEE Access  
Researchers have collected Twitter data to study a wide range of topics. This growing body of literature, however, has not yet been reviewed systematically to synthesize Twitter-related papers.  ...  This study systematically mines a large number of Twitter-based studies to characterize the relevant literature by an efficient and effective approach.  ...  Given the large number of Twitter-related studies, a systematic review can provide a valuable perspective to better define the literature landscape.  ... 
doi:10.1109/access.2020.2983656 fatcat:3ifo6czjifai7pfpro3bnu7p5a

Robot-Based Intervention for Children with Autism Spectrum Disorder: A Systematic Literature Review

Katrin D. Bartl-Pokorny, Malgorzata Pykala, Pinar Uluer, Duygun Erol Barkana, Alice Baird, Hatice Kose, Tatjana Zorcec, Ben Robins, Bjorn W. Schuller, Agnieszka Landowska
2021 IEEE Access  
Here, we reviewed robot-based interventions targeting emotion-related skills for children with ASD following the guidelines of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA  ...  From a total of 609 identified papers, 60 publications including 50 original articles and 10 non-empirical articles including review articles and theoretical articles were eligible for the synthesis.  ...  ACKNOWLEDGMENT The authors thank Srividya Tirunellai for assistance in the literature search process.  ... 
doi:10.1109/access.2021.3132785 fatcat:fpu6yeb4uzbinbuucis3cb76zq

Landscape of Automated Log Analysis: a Systematic Literature Review and Mapping Study

Lukasz Korzeniowski, Krzysztof Goczyla
2022 IEEE Access  
This paper provides a systematic review of recent literature (covering the period between 2000 and June 2021, concentrating primarily on the last five years of this period) related to automated log analysis  ...  Our contribution is threefold: we present an overview of various research areas in the field; we identify different types of log files that are used in research, and we systematize the content of log files  ...  This study is positioned between a systematic mapping study of the domain and a systematic literature review.  ... 
doi:10.1109/access.2022.3152549 fatcat:l2vf6x52qrharhvefonttrcn5e

Using machine learning to generate test oracles: a systematic literature review

Afonso Fontes, Gregory Gay
2021 Proceedings of the 1st International Workshop on Test Oracles  
We have characterized emerging research in this area through a systematic literature review examining oracle types, researcher goals, the ML techniques applied, how the generation process was assessed,  ...  We hope that our findings will serve as a roadmap and inspiration for researchers in this field.  ...  To that end, we have performed a systematic literature review. Following a search of relevant databases and a rigorous filtering process, we have gathered a sample of 22 relevant studies.  ... 
doi:10.1145/3472675.3473974 fatcat:ujgxtrjfs5hrle6iwi3gxfk6gy
« Previous Showing results 1 — 15 out of 3,299 results