Automatic Detection of Fake Profiles in Online Social Network Using Soft Computing
F Farooqui, M Usman Khan - International Journal of Engineering …, 2022 - papers.ssrn.com
… is crucial to maintaining the integrity, security, and trustworthiness of online platforms. This
… involved in automatically detecting fake profiles. The detection of fake profiles poses a …
… involved in automatically detecting fake profiles. The detection of fake profiles poses a …
[BOOK][B] Soft computing and medical bioinformatics
… The first stage is used to identify the spam profiles in online social networks, and by using …
fully explored, and not many researches on its automatic detection were done. This two-stage …
fully explored, and not many researches on its automatic detection were done. This two-stage …
A Study on Detection analysis of Sophisticated Cyber Threats & its Response
SK Deo, PK Mahapatro - … and Management Research (IJEMR), 2016 - indianjournals.com
… social media was Profile Impersonation. Many of us have seen in Facebook the fake profiles
… This generally is made into a phishing link to your known social network. One precaution to …
… This generally is made into a phishing link to your known social network. One precaution to …
SNSJam: Road traffic analysis and prediction by fusing data from multiple social networks
B Alkouz, Z Al Aghbari - Information Processing & Management, 2020 - Elsevier
… detect and predict traffic jams. Several systems have been proposed to detect traffic events;
however, these systems use … systems either fail to automatically detect the cause of events or …
however, these systems use … systems either fail to automatically detect the cause of events or …
[PDF][PDF] Tracking coronavirus pandemic diseases using social media: a machine learning approach
… Social media platforms … Social media platforms in order to detect illness and make future
predictions in order to support hospitals nowadays. Article [8] presented an automatic detection …
predictions in order to support hospitals nowadays. Article [8] presented an automatic detection …
Cyber Crimes in India 2012–13: Facts and Measures
BD Karhad - … of Engineering and Management Research (IJEMR …, 2014 - indianjournals.com
… Popular social networking sites like Facebook are used to attain such fraudulent goals. … 13)
Make sure that social networking profiles (such as Facebook, twitter etc.) are set to Private. 14…
Make sure that social networking profiles (such as Facebook, twitter etc.) are set to Private. 14…
[PDF][PDF] Patterns of Usage of Social Networking Sites by College Students during COVID-19 Pandemic Period
C Thomas, PK Sreekala - User-Centric Library Systems and Services - researchgate.net
… , schools, and universities use social media as a formal … use of social media as a platform
in education. Less than half of the respondents to this study supported the use of social media …
in education. Less than half of the respondents to this study supported the use of social media …
Online Candidate Selection System for Elections
HE Meregngnage, J Fernando… - International …, 2023 - ijemr.vandanapublications.com
… Moreover, the system employs sentiment analysis techniques to analyze comments posted
by voters on candidates' social media accounts. By categorizing these comments as positive …
by voters on candidates' social media accounts. By categorizing these comments as positive …
Detecting malicious URLs using machine learning techniques: review and research directions
M Aljabri, HS Altamimi, SA Albelali, M Al-Harbi… - IEEE …, 2022 - ieeexplore.ieee.org
… Internet develops and grows, many of our activities are now conducted online, including e-commerce,
business, social networking… that use an approach to automatically detect newly …
business, social networking… that use an approach to automatically detect newly …
Securing online transactions with biometric methods
JA Pope, D Bartmann - International Journal of Electronic …, 2010 - inderscienceonline.com
… This means the user must have his or her own computer or the computer being used must
be equipped with the hardware and software interface to use the equipment. A common …
be equipped with the hardware and software interface to use the equipment. A common …