Academic literature on the topic 'Malicious bots'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malicious bots.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malicious bots"
Geer, D. "Malicious bots threaten network security." Computer 38, no. 1 (2005): 18–20. http://dx.doi.org/10.1109/mc.2005.26.
Full textKolomeets, M., and A. Chechulin. "Properties of Malicious Social Bots." Proceedings of Telecommunication Universities 9, no. 1 (2023): 94–104. http://dx.doi.org/10.31854/1813-324x-2023-9-1-94-104.
Full textSneha, B. "Detecting Malicious Twitter Bots using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 1457–63. http://dx.doi.org/10.22214/ijraset.2024.59085.
Full textSopinti Chaitanya Raj and B.Srinivas.S.P.Kumar. "DETECTING MALICIOUS TWITTER BOTS USING MACHINE LEARNING." international journal of engineering technology and management sciences 6, no. 6 (2022): 382–88. http://dx.doi.org/10.46647/ijetms.2022.v06i06.068.
Full textM Nithin, Meer Eshak Ahammad, Nichenametla Shashank, Shaik Hyder Ali, and K.Mudduswamy. "Detection of Malicious Social Bots Using Learning Automata with URL Features in Twitter Network." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 3 (2025): 261–66. https://doi.org/10.32628/cseit2511317.
Full textN. Ezhil Arasi, Dr. G Manikandan, Ms. S. Hemalatha, and Ms. Vilma Veronica. "Malicious Social Bot Using Twitter Network Analysis in Django." International Journal of Scientific Research in Science and Technology 11, no. 2 (2024): 114–13. http://dx.doi.org/10.32628/ijsrst52411222.
Full textShi, Peining, Zhiyong Zhang, and Kim-Kwang Raymond Choo. "Detecting Malicious Social Bots Based on Clickstream Sequences." IEEE Access 7 (2019): 28855–62. http://dx.doi.org/10.1109/access.2019.2901864.
Full textGnanasekar, A. "Detecting Spam Bots on Social Network." Revista Gestão Inovação e Tecnologias 11, no. 2 (2021): 850–60. http://dx.doi.org/10.47059/revistageintec.v11i2.1719.
Full textMolkova, L. U., and E. D. Pasechnic. "PROBLEMS OF NEGATIVE IMPACT AND ECONOMIC HARM CAUSED BY BOTNETS." ECONOMIC VECTOR 2, no. 37 (2024): 200–203. http://dx.doi.org/10.36807/2411-7269-2024-2-37-200-203.
Full textHe, Yukun, Guangyan Zhang, Jie Wu, and Qiang Li. "Understanding a prospective approach to designing malicious social bots." Security and Communication Networks 9, no. 13 (2016): 2157–72. http://dx.doi.org/10.1002/sec.1475.
Full textDissertations / Theses on the topic "Malicious bots"
Ljung, Fredrik, and Oscar Arnflo. "How malicious bots interact with an online contest with gamification : A study in methods for identifying and protecting against bots." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186445.
Full textAl-Hammadi, Yousof Ali Abdulla. "Behavioural correlation for malicious bot detection." Thesis, University of Nottingham, 2010. http://eprints.nottingham.ac.uk/11359/.
Full textZarras, Apostolos [Verfasser], Thorsten [Akademischer Betreuer] Holz, and Herbert [Akademischer Betreuer] Bos. "Towards detection and prevention of malicious activities against web applications and internet services / Apostolos Zarras. Gutachter: Thorsten Holz ; Herbert Bos." Bochum : Ruhr-Universität Bochum, 2016. http://d-nb.info/1082425583/34.
Full textCruz, Paulo Alexandre Patrão da. "Malicious BOT Detection." Master's thesis, 2019. http://hdl.handle.net/10316/87307.
Full textTran, Khoi-Nguyen Dao. "Detecting vandalism on Wikipedia across multiple languages." Phd thesis, 2015. http://hdl.handle.net/1885/14453.
Full textChih-Hao, Su, and 蘇至浩. "Near Optimal Defense Resource Allocation and Information Dividing-and-Allocation Strategies to Minimize Information Leakage Considering both Random Errors and Malicious Attacks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/19113779985732747071.
Full textSu, Chih-Hao. "Near Optimal Defense Resource Allocation and Information Dividing-and-Allocation Strategies to Minimize Information Leakage Considering both Random Errors and Malicious Attacks." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2607200817422600.
Full text"Discovering and Mitigating Social Data Bias." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.45009.
Full textBooks on the topic "Malicious bots"
Dunham, Ken. Malicious bots: An inside look into the cyber-criminal underground of the internet. Auerbach Publications, 2008.
Find full textDunham, Ken, and Jim Melnick. Malicious Bots. Auerbach Publications, 2008. http://dx.doi.org/10.1201/9781420069068.
Full textDunham, Ken, and Jim Melnick. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. Taylor & Francis Group, 2008.
Find full textBook chapters on the topic "Malicious bots"
Satija, Tanu, and Nirmalya Kar. "Detecting Malicious Twitter Bots Using Machine Learning." In Advances in Computational Intelligence, Security and Internet of Things. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3666-3_16.
Full textChen, Zhouhan, Rima S. Tanash, Richard Stoll, and Devika Subramanian. "Hunting Malicious Bots on Twitter: An Unsupervised Approach." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67256-4_40.
Full textCresci, Stefano. "Detecting Malicious Social Bots: Story of a Never-Ending Clash." In Disinformation in Open Online Media. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39627-5_7.
Full textPardo Echevarría, Daniel, Nayma Cepero-Perez, Mailyn Moreno-Espino, Helder J. Chissingui, and Humberto Díaz-Pando. "Detection of Malicious Bots Using a Proactive Supervised Classification Approach." In Progress in Artificial Intelligence and Pattern Recognition. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49552-6_26.
Full textMatsumoto, Ryutaro, and Shingo Yamaguchi. "On Building a Firewall with White Hat Bots in the Neighborhood of Malicious Bots in Large-Scale Networks." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-5703-9_51.
Full textKumar, R. Kiran, G. Ramesh Babu, G. Sai Chaitanya Kumar, and N. Raghavendra Sai. "Malicious Social Bots Detection in the Twitter Network Using Learning Automata with URL Features." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-6690-5_43.
Full textSpyros, Arnolnt, Dimitrios Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. "SECANT: Cyberthreat Intelligence in IoMT Ecosystems." In Security Informatics and Law Enforcement. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-62083-6_37.
Full textSenarath, Yasas, Hemant Purohit, and Rajendra Akerkar. "Violence-Inducing Behavior Prevention in Social-Cyber Space." In AI, Data, and Digitalization. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53770-7_10.
Full textGallagher, Sean, Ben Gelman, Salma Taoufiq, et al. "Phishing and Social Engineering in the Age of LLMs." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_8.
Full text"Botnets and the eCrime Cycle: The iSIGHT Partners’ Approach." In Malicious Bots. Auerbach Publications, 2008. http://dx.doi.org/10.1201/9781420069068-10.
Full textConference papers on the topic "Malicious bots"
Bhale, Kanchan, and Thirupurasundari D. R. "Malicious Social Bot Detection in Twitter: A Review." In 2024 4th International Conference on Computer, Communication, Control & Information Technology (C3IT). IEEE, 2024. https://doi.org/10.1109/c3it60531.2024.10829441.
Full textSwathi, Palagiri, Mousumi Karmakar, Sumit Kumar Banshal, and Raka Moni. "Malicious Social Bot Detection: RL-RNN Based Hybrid Approach." In 2024 3rd Edition of IEEE Delhi Section Flagship Conference (DELCON). IEEE, 2024. https://doi.org/10.1109/delcon64804.2024.10866368.
Full textShuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.
Full text"Bots: Genuine or Malicious." In 2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2023. http://dx.doi.org/10.1109/uemcon59035.2023.10316169.
Full textYamanoue, Takashi, Kentaro Oda, and Koichi Shimozono. "Capturing malicious bots using a beneficial bot and wiki." In the ACM SIGUCCS 40th annual conference. ACM Press, 2012. http://dx.doi.org/10.1145/2382456.2382477.
Full textKolomeets, Maxim, and Andrey Chechulin. "Analysis of the Malicious Bots Market." In 2021 29th Conference of Open Innovations Association (FRUCT). IEEE, 2021. http://dx.doi.org/10.23919/fruct52173.2021.9435421.
Full textRao, Paradesi Subba, Farooq Sunar Mahammad, Parumanchala Bhaskar, et al. "Detecting malicious Twitter bots using machine learning." In INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRONICS AND COMMUNICATION ENGINEERING - 2023. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0212693.
Full textBrokate, Cristian, Manon Richard, Lisa Giordani, and Jean Liénard. "SWATTING Spambots: Real-time Detection of Malicious Bots on X." In WWW '24: The ACM Web Conference 2024. ACM, 2024. http://dx.doi.org/10.1145/3589335.3651564.
Full textSruthi, Mamidala, Sravanthi Thota, P. Kumaraswamy, and G. Mahesh. "Demonstrate the performance of social bots in identifying the malicious bots based during communication in social media." In INTERNATIONAL CONFERENCE ON RESEARCH IN SCIENCES, ENGINEERING & TECHNOLOGY. AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0082276.
Full textVashisht, Swati, Sushil Kumar Gupta, Atul Fegade, Shiv Ashish Dhondiyal, Rohit Kumar, and G. Revathy. "Detection of Malicious Social Bots with the Aid of Learning Automata on Twitter." In 2022 5th International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2022. http://dx.doi.org/10.1109/ic3i56241.2022.10073346.
Full textReports on the topic "Malicious bots"
Kelly, Luke. Threats to Civilian Aviation Since 1975. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.019.
Full text