International audienceSocial networking sites are increasingly subject to malicious activities such as self-propagating worms, confidence scams and drive-by-download malwares. The high number of users associated with the presence of sensitive data, such as personal or professional information, is certainly an unprecedented opportunity for attackers. These attackers are moving away from previous platforms of attack, such as emails, towards social networking websites. In this paper, we present a full stack methodology for the identification of campaigns of malicious profiles on social networking sites, composed of maliciousness classification, campaign discovery and attack profiling. The methodology named REPLOT, for REtrieving Profile Links ...
Propagation of malicious code on online social networks (OSN) is often a coordinated effort by collu...
Cybercriminals have found in online social networks a propitious medium to spread spam and malicious...
Cybercriminals exploit a large number of ephemeral malicious accounts for conducting large-scale sim...
Social networking sites are increasingly subject to malicious activities such as self-propagating wo...
In the last few decades social networking sites have encountered their first large-scale security is...
International audienceIn the last few decades social networking sites have encountered their first l...
International audienceIn the last few decades social networking sites have encountered their first l...
Social networking has become a popular way for users to meet and interact online. Users spend a sign...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...
Today, people of all ages are increasingly using Web platforms for social interaction. Consequently,...
Thousands of people across the globe utilize online services. Certain social media platforms, like a...
In this study we investigate the characteristics of malicious account behaviors on Twitter based on ...
In the last years, the widespread diffusion of Online Social Networks (OSNs) has enabled new forms o...
ABSTRACT: Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distr...
Since the harmful consequences of the online publication of fake news have emerged clearly, many res...
Propagation of malicious code on online social networks (OSN) is often a coordinated effort by collu...
Cybercriminals have found in online social networks a propitious medium to spread spam and malicious...
Cybercriminals exploit a large number of ephemeral malicious accounts for conducting large-scale sim...
Social networking sites are increasingly subject to malicious activities such as self-propagating wo...
In the last few decades social networking sites have encountered their first large-scale security is...
International audienceIn the last few decades social networking sites have encountered their first l...
International audienceIn the last few decades social networking sites have encountered their first l...
Social networking has become a popular way for users to meet and interact online. Users spend a sign...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...
Today, people of all ages are increasingly using Web platforms for social interaction. Consequently,...
Thousands of people across the globe utilize online services. Certain social media platforms, like a...
In this study we investigate the characteristics of malicious account behaviors on Twitter based on ...
In the last years, the widespread diffusion of Online Social Networks (OSNs) has enabled new forms o...
ABSTRACT: Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distr...
Since the harmful consequences of the online publication of fake news have emerged clearly, many res...
Propagation of malicious code on online social networks (OSN) is often a coordinated effort by collu...
Cybercriminals have found in online social networks a propitious medium to spread spam and malicious...
Cybercriminals exploit a large number of ephemeral malicious accounts for conducting large-scale sim...