Social media networks, like Facebook and Twitter, are increasingly becoming important part of most people\u27s lives. Twitter provides a useful platform for sharing contents, ideas, opinions, and promoting products and election campaigns. Due to the increased popularity, it became vulnerable to malicious attacks caused by social bots. Social bots are automated accounts created for different purposes. They are involved in spreading rumors and false information, cyberbullying, spamming, and manipulating the ecosystem of social network. Most of the social bots detection methods rely on the utilization of offline data for both training and testing. In this paper, we use Apache Kafka, a big data analytics tool to stream data from Twitter API in ...
© 2020 Elsevier Ltd The increased availability of social media big data has created a unique challen...
Objectives COVID-19 (SARS-CoV-2) pandemic has infected hundreds of millions and inflicted millions o...
Rapid development and adaptation of the Internet of Things (IoT) has created new problems for securi...
Detecting criminal activity online is not a new concept but how it can occur is changing. Technology...
Nowadays several millions of people are throughout the day active, while hundreds of new accounts ar...
Fake news detection on social media has been very challenging, with diverse techniques already imple...
© 1989-2012 IEEE. The identification of social media communities has recently been of major concern,...
This chapter presents the central theme and a big picture of the methods and technologies covered in...
Social data analysis has become a vital tool for businesses and organisations for mining data from s...
© 2016 ACM. We propose in this paper to handle the problem of overload in social interactions by gro...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2019 Association for Computing Machinery. This paper introduces Speculo. The primary purpose of Sp...
Public opinion is of critical importance to businesses and governments. It represents the collective...
© 2016 IEEE. This paper presents a system for tracking the execution of social actions over Facebook...
© 2020 Elsevier Ltd The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc...
© 2020 Elsevier Ltd The increased availability of social media big data has created a unique challen...
Objectives COVID-19 (SARS-CoV-2) pandemic has infected hundreds of millions and inflicted millions o...
Rapid development and adaptation of the Internet of Things (IoT) has created new problems for securi...
Detecting criminal activity online is not a new concept but how it can occur is changing. Technology...
Nowadays several millions of people are throughout the day active, while hundreds of new accounts ar...
Fake news detection on social media has been very challenging, with diverse techniques already imple...
© 1989-2012 IEEE. The identification of social media communities has recently been of major concern,...
This chapter presents the central theme and a big picture of the methods and technologies covered in...
Social data analysis has become a vital tool for businesses and organisations for mining data from s...
© 2016 ACM. We propose in this paper to handle the problem of overload in social interactions by gro...
© 2019 Association for Computing Machinery. The insecurity of the Internet-of-Things (IoT) paradigm ...
© 2019 Association for Computing Machinery. This paper introduces Speculo. The primary purpose of Sp...
Public opinion is of critical importance to businesses and governments. It represents the collective...
© 2016 IEEE. This paper presents a system for tracking the execution of social actions over Facebook...
© 2020 Elsevier Ltd The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc...
© 2020 Elsevier Ltd The increased availability of social media big data has created a unique challen...
Objectives COVID-19 (SARS-CoV-2) pandemic has infected hundreds of millions and inflicted millions o...
Rapid development and adaptation of the Internet of Things (IoT) has created new problems for securi...