Machine Learning Based Detection for Compromised Accounts on Social Media Networks
The proliferation of social networking platforms has led to a corresponding increase in the frequency and sophistication of cyberattacks targeting user accounts. Compromised accounts can be used to spread misinformation, launch phishing attacks, and steal personal information. This paper presents a...
| Main Authors: | K., Swapna, M., Rithika, K., Rukmini, S., Swachitha, Y., Komali |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
INTI International University
2025
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2154/ http://eprints.intimal.edu.my/2154/1/jods2025_12.pdf http://eprints.intimal.edu.my/2154/2/697 |
Similar Items
Covid-19 Fake News Detection Model On Social Media Data Using Machine Learning Techniques
by: Liew, Kelvin Kai Xuan
Published: (2023)
by: Liew, Kelvin Kai Xuan
Published: (2023)
COVID-19 fake news detection model on social media data using machine learning techniques
by: Kai Xuan, Kelvin Liew, et al.
Published: (2023)
by: Kai Xuan, Kelvin Liew, et al.
Published: (2023)
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024)
by: Keerthana, S.N, et al.
Published: (2024)
Identifying PTSD symptoms using machine learning techniques on social media
by: Muhamad Aiman, Ibrahim, et al.
Published: (2023)
by: Muhamad Aiman, Ibrahim, et al.
Published: (2023)
A social network of crime : A review of the use of social networks for crime and the detection of crime
by: Drury, Brett, et al.
Published: (2022)
by: Drury, Brett, et al.
Published: (2022)
Automated System for Detecting Cyber Bot Attacks in 5G Networks using Machine Learning
by: Thrupthi, C.P., et al.
Published: (2024)
by: Thrupthi, C.P., et al.
Published: (2024)
Machine Learning Malware Detection For Android
by: Amir Muhammad Hafiz, Othman
Published: (2022)
by: Amir Muhammad Hafiz, Othman
Published: (2022)
Protected bidding against compromised information injection in IoT-based smart grid
by: Bhuiyan, Md Zakirul Alam, et al.
Published: (2019)
by: Bhuiyan, Md Zakirul Alam, et al.
Published: (2019)
Malware Detection In Android Using Machine Learning
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
by: Muhammad Hazriq Akmal, Zairol
Published: (2023)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
10 c’s of social networking, interconnections and
the impact on social networking
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Malware detection through machine learning techniques
by: Amer, Ahmed, et al.
Published: (2019)
by: Amer, Ahmed, et al.
Published: (2019)
Predicting Suicidal Ideation Via Social Media
by: Boon, Kar Lih
Published: (2023)
by: Boon, Kar Lih
Published: (2023)
Phishing Website Detection Technique Using Machine Learning
by: Nurul Amira, Mohd Zin
Published: (2022)
by: Nurul Amira, Mohd Zin
Published: (2022)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
Detection of paddy plant diseases using google teachable machine
by: Nor Azuana, Ramli, et al.
Published: (2024)
by: Nor Azuana, Ramli, et al.
Published: (2024)
Early Detection Of ADHD Among Children Using Machine Learning
by: Nur Atiqah, Kamal
Published: (2023)
by: Nur Atiqah, Kamal
Published: (2023)
Simulating Theory-of Constraint Problem with Novel Fuzzy Compromise Linear Programming Model
by: Bhattacharya , Arijit, et al.
Published: (2008)
by: Bhattacharya , Arijit, et al.
Published: (2008)
Effective methods to detect cyberbullying and influential spreaders in an online social network / Mohammed Ali Derhem Al Garadi
by: Mohammed Ali Derhem , Al Garadi
Published: (2017)
by: Mohammed Ali Derhem , Al Garadi
Published: (2017)
A Smile Detection for Hands-Free Selfie Capture Using Machine Learning
by: G., Ramya, et al.
Published: (2025)
by: G., Ramya, et al.
Published: (2025)
Fingertip detection using histogram of gradients and support vector machine
by: Sophian, Ali, et al.
Published: (2017)
by: Sophian, Ali, et al.
Published: (2017)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
A concept to measure social capital in social network sites
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
Sentiment Analysis in Arabic Social Media Using Association Rule Mining
by: Ahmed, AL-Saffar, et al.
Published: (2016)
by: Ahmed, AL-Saffar, et al.
Published: (2016)
Estimating Depressive Tendencies Of Twitter User Via Social Media Data
by: Loh, Hooi Teng
Published: (2023)
by: Loh, Hooi Teng
Published: (2023)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
by: Nurul’Adilah , Nazri
Published: (2022)
by: Nurul’Adilah , Nazri
Published: (2022)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021)
by: Hazim, Hanif, et al.
Published: (2021)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Detecting Arabic terrorism messages on twitter using machine learning / Alharbi Norah Muteb S
by: Alharbi, Norah Muteb S
Published: (2019)
by: Alharbi, Norah Muteb S
Published: (2019)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Compilation of Social Media and Social Networking Sites Features
by: Ruzainisuhanaliza, Abdul Muni, et al.
Published: (2013)
by: Ruzainisuhanaliza, Abdul Muni, et al.
Published: (2013)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Similar Items
-
Covid-19 Fake News Detection Model On Social Media Data Using Machine Learning Techniques
by: Liew, Kelvin Kai Xuan
Published: (2023) -
COVID-19 fake news detection model on social media data using machine learning techniques
by: Kai Xuan, Kelvin Liew, et al.
Published: (2023) -
Evaluating Machine Learning Algorithms for Fake Currency Detection
by: Keerthana, S.N, et al.
Published: (2024) -
Identifying PTSD symptoms using machine learning techniques on social media
by: Muhamad Aiman, Ibrahim, et al.
Published: (2023) -
A social network of crime : A review of the use of social networks for crime and the detection of crime
by: Drury, Brett, et al.
Published: (2022)