Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/11934
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Karataş, Arzum | en_US |
dc.contributor.author | Şahin, Serap | en_US |
dc.date.accessioned | 2022-01-27T13:08:25Z | - |
dc.date.available | 2022-01-27T13:08:25Z | - |
dc.date.issued | 2017-10 | - |
dc.identifier.uri | https://hdl.handle.net/11147/11934 | - |
dc.description | 10th International Conference on Information Security and Cryptology (ISCTurkey 2017); October 2017, Ankara, Türkiye | en_US |
dc.description.abstract | The rise of web services and popularity of online social networks (OSN) like Facebook, Twitter, LinkedIn etc. have led to the rise of unwelcome social bots as automated social actors. Those actors can play many malicious roles including infiltrators of human conversations, scammers, impersonators, misinformation disseminators, stock market manipulators, astroturfers, and any content polluter (spammers, malware spreaders) and so on. It is undeniable that social bots have major importance on social networks. Therefore, this paper reveals the potential hazards of malicious social bots, reviews the detection techniques within a methodological categorization and proposes avenues for future research. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Bilgi Güvenliği Derneği | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Social bots | en_US |
dc.subject | Social bot detection | en_US |
dc.subject | Online Social Network | en_US |
dc.subject | Sybils | en_US |
dc.title | A review on social bot detection techniques and research directions | en_US |
dc.type | Conference Object | en_US |
dc.authorid | 0000-0002-8859-8435 | en_US |
dc.institutionauthor | Karataş, Arzum | en_US |
dc.institutionauthor | Şahin, Serap | en_US |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.relation.conference | 10th International Conference on Information Security and Cryptology (ISCTurkey 2017) | en_US |
dc.relation.publication | Proceedings of 10th International Conference on Information Security and Cryptology (ISCTURKEY 2017) | en_US |
dc.contributor.affiliation | 01. Izmir Institute of Technology | en_US |
dc.contributor.affiliation | 01. Izmir Institute of Technology | en_US |
dc.relation.isbn | 978-605-86904-7-9 | en_US |
dc.description.startpage | 156 | en_US |
dc.description.endpage | 161 | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Review_on_Social_Bot.pdf | Conference Object | 649.2 kB | Adobe PDF | View/Open |
CORE Recommender
Page view(s)
17,218
checked on Nov 18, 2024
Download(s)
1,308
checked on Nov 18, 2024
Google ScholarTM
Check
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.