Journal articles on the topic 'Malicious bots'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Malicious bots.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Geer, D. "Malicious bots threaten network security." Computer 38, no. 1 (2005): 18–20. http://dx.doi.org/10.1109/mc.2005.26.
Full textKolomeets, M., and A. Chechulin. "Properties of Malicious Social Bots." Proceedings of Telecommunication Universities 9, no. 1 (2023): 94–104. http://dx.doi.org/10.31854/1813-324x-2023-9-1-94-104.
Full textSneha, B. "Detecting Malicious Twitter Bots using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (2024): 1457–63. http://dx.doi.org/10.22214/ijraset.2024.59085.
Full textSopinti Chaitanya Raj and B.Srinivas.S.P.Kumar. "DETECTING MALICIOUS TWITTER BOTS USING MACHINE LEARNING." international journal of engineering technology and management sciences 6, no. 6 (2022): 382–88. http://dx.doi.org/10.46647/ijetms.2022.v06i06.068.
Full textM Nithin, Meer Eshak Ahammad, Nichenametla Shashank, Shaik Hyder Ali, and K.Mudduswamy. "Detection of Malicious Social Bots Using Learning Automata with URL Features in Twitter Network." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 3 (2025): 261–66. https://doi.org/10.32628/cseit2511317.
Full textN. Ezhil Arasi, Dr. G Manikandan, Ms. S. Hemalatha, and Ms. Vilma Veronica. "Malicious Social Bot Using Twitter Network Analysis in Django." International Journal of Scientific Research in Science and Technology 11, no. 2 (2024): 114–13. http://dx.doi.org/10.32628/ijsrst52411222.
Full textShi, Peining, Zhiyong Zhang, and Kim-Kwang Raymond Choo. "Detecting Malicious Social Bots Based on Clickstream Sequences." IEEE Access 7 (2019): 28855–62. http://dx.doi.org/10.1109/access.2019.2901864.
Full textGnanasekar, A. "Detecting Spam Bots on Social Network." Revista Gestão Inovação e Tecnologias 11, no. 2 (2021): 850–60. http://dx.doi.org/10.47059/revistageintec.v11i2.1719.
Full textMolkova, L. U., and E. D. Pasechnic. "PROBLEMS OF NEGATIVE IMPACT AND ECONOMIC HARM CAUSED BY BOTNETS." ECONOMIC VECTOR 2, no. 37 (2024): 200–203. http://dx.doi.org/10.36807/2411-7269-2024-2-37-200-203.
Full textHe, Yukun, Guangyan Zhang, Jie Wu, and Qiang Li. "Understanding a prospective approach to designing malicious social bots." Security and Communication Networks 9, no. 13 (2016): 2157–72. http://dx.doi.org/10.1002/sec.1475.
Full textJyothis, Joseph, Binu Nandhitha, K. B. Vyshnavi, and Santhosh Nandana. "A Survey on Twitter Bot Detection: Comparative Study of Machine Learning and Deep Learning Techniques." Research and Reviews: Advancement in Robotics 8, no. 3 (2025): 1–11. https://doi.org/10.5281/zenodo.15515794.
Full textLiu, Xia. "A big data approach to examining social bots on Twitter." Journal of Services Marketing 33, no. 4 (2019): 369–79. http://dx.doi.org/10.1108/jsm-02-2018-0049.
Full textQiao, Boyu, Kun Li, Wei Zhou, Shilong Li, Qianqian Lu, and Songlin Hu. "BotSim: LLM-Powered Malicious Social Botnet Simulation." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 13 (2025): 14377–85. https://doi.org/10.1609/aaai.v39i13.33575.
Full textChechulin, A., and M. Kolomeets. "Approach to Detecting Malicious Bots in the Vkontakte Social Network and Assessing Their Parameters." Proceedings of Telecommunication Universities 10, no. 2 (2024): 92–101. http://dx.doi.org/10.31854/1813-324x-2024-10-2-92-101.
Full textWang, Xiujuan, Qianqian Zheng, Kangfeng Zheng, Yi Sui, Siwei Cao, and Yutong Shi. "Detecting Social Media Bots with Variational AutoEncoder and k-Nearest Neighbor." Applied Sciences 11, no. 12 (2021): 5482. http://dx.doi.org/10.3390/app11125482.
Full textElmas, Tuğrulcan, Rebekah Overdorf, and Karl Aberer. "Characterizing Retweet Bots: The Case of Black Market Accounts." Proceedings of the International AAAI Conference on Web and Social Media 16 (May 31, 2022): 171–82. http://dx.doi.org/10.1609/icwsm.v16i1.19282.
Full textAlipour, Sanaz Adel, Rita Orji, and Nur Zincir-Heywood. "Behaviour and Bot Analysis on Online Social Networks." International Journal of Technology and Human Interaction 19, no. 1 (2023): 1–19. http://dx.doi.org/10.4018/ijthi.327789.
Full textLatah, Majd. "Detection of malicious social bots: A survey and a refined taxonomy." Expert Systems with Applications 151 (August 2020): 113383. http://dx.doi.org/10.1016/j.eswa.2020.113383.
Full textS G, Deekshith. "Twitter Bots Detection Using Machine Learning Techniques." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1536–41. http://dx.doi.org/10.22214/ijraset.2021.36637.
Full textDhanesh, Arya, Jyothika K, Malavika Jayaraj, Nevin Jose Antony, and Anu Treesa George. "Comprehensive Strategies for Identifying X(Twitter) Bots." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43583.
Full textMr. S.V Hemanth, S Sneha Reddy, R Nithin, G Keerthi, and Shinde Vinayak Rao Patil. "Automated Bot Detection on Twitter UsingURL Patterns and Learning Automata." international journal of engineering technology and management sciences 8, no. 3 (2024): 205–10. http://dx.doi.org/10.46647/ijetms.2024.v08i03.025.
Full textShevtsov, Alexander, Christos Tzagkarakis, Despoina Antonakaki, and Sotiris Ioannidis. "Identification of Twitter Bots Based on an Explainable Machine Learning Framework: The US 2020 Elections Case Study." Proceedings of the International AAAI Conference on Web and Social Media 16 (May 31, 2022): 956–67. http://dx.doi.org/10.1609/icwsm.v16i1.19349.
Full textZhang, Weisha, Jiazhong Lu, Yulin Liu, and Xiaojun Liu. "Twitter Bots in Cyber-Physical-Social Systems: Detection and Estimation Based on the SEIR Model." Security and Communication Networks 2023 (May 8, 2023): 1–9. http://dx.doi.org/10.1155/2023/6234030.
Full textIliou, Christos, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, and Ioannis Kompatsiaris. "Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics." Digital Threats: Research and Practice 2, no. 3 (2021): 1–26. http://dx.doi.org/10.1145/3447815.
Full textSATOH, Akihiro, Yutaka NAKAMURA, Yutaka FUKUDA, Daiki NOBAYASHI, and Takeshi IKENAGA. "An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots." IEICE Transactions on Information and Systems E104.D, no. 5 (2021): 669–72. http://dx.doi.org/10.1587/transinf.2020ntl0001.
Full textAssenmacher, Dennis, Lena Clever, Lena Frischlich, Thorsten Quandt, Heike Trautmann, and Christian Grimme. "Demystifying Social Bots: On the Intelligence of Automated Social Media Actors." Social Media + Society 6, no. 3 (2020): 205630512093926. http://dx.doi.org/10.1177/2056305120939264.
Full textKareem, Rafeef, and Wesam Bhaya. "Fake Profiles Types of Online Social Networks: A Survey." International Journal of Engineering & Technology 7, no. 4.19 (2018): 919. http://dx.doi.org/10.14419/ijet.v7i4.19.28071.
Full textMolkova, L. Y., and M. V. Gofman. "Ensuring security in the ecosystem of intelligent transport infrastructure using methods to combat malicious bots." E3S Web of Conferences 549 (2024): 08025. http://dx.doi.org/10.1051/e3sconf/202454908025.
Full textBazarkina, Darya Yu, and Evgeny N. Pashentsev. "Malicious Use of Artificial Intelligence." Russia in Global Affairs 18, no. 4 (2020): 154–77. http://dx.doi.org/10.31278/1810-6374-2020-18-4-154-177.
Full textRout, Rashmi Ranjan, Greeshma Lingam, and D. V. L. N. Somayajulu. "Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network." IEEE Transactions on Computational Social Systems 7, no. 4 (2020): 1004–18. http://dx.doi.org/10.1109/tcss.2020.2992223.
Full textKumar, Sudhir. "Online Defamation in the Digital Age: Issues and Challenges with Particular Reference to Deepfakes and Malicious Bots." International Journal of Law and Policy 2, no. 8 (2024): 32–41. http://dx.doi.org/10.59022/ijlp.200.
Full textGuerar, Meriem, Luca Verderame, Mauro Migliardi, Francesco Palmieri, and Alessio Merlo. "Gotta CAPTCHA ’Em All: A Survey of 20 Years of the Human-or-computer Dilemma." ACM Computing Surveys 54, no. 9 (2022): 1–33. http://dx.doi.org/10.1145/3477142.
Full textS, Varsha, P. S. Prathiba, N. Deepika, Janghel Neha, and V. Ashoka D. "Performance Analysis of Machine Learning Algorithms in SMP: A Case Study of Twitter." Journal of Computer Science Engineering and Software Testing 5, no. 2 (2019): 17–22. https://doi.org/10.5281/zenodo.3268439.
Full textKlinkhammer, Dennis. "Misuse of large language models: Exploiting weaknesses for target-specific outputs." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 33, no. 2 (2024): 29–34. http://dx.doi.org/10.14512/tatup.33.2.29.
Full textYamaguchi, Shingo. "Botnet Defense System: Observability, Controllability, and Basic Command and Control Strategy." Sensors 22, no. 23 (2022): 9423. http://dx.doi.org/10.3390/s22239423.
Full textKhan, Rafaqat Alam. "Spammer Detection: A Study of Spam Filter Commentson YouTube Videos." International Journal for Electronic Crime Investigation 2, no. 4 (2018): 5. http://dx.doi.org/10.54692/ijeci.2018.020425.
Full textKhan, Rafaqat Alam. "Spammer Detection: A Study of Spam Filter Commentson YouTube Videos." International Journal for Electronic Crime Investigation 2, no. 4 (2018): 5. http://dx.doi.org/10.54692/ijeci.2019.030125.
Full textM, Vinay Sai. "Detecting and Analyzing the Malicious Social Bots by using Data Mining and Naïve Bayesian Classifier." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 3345–50. http://dx.doi.org/10.30534/ijeter/2020/75872020.
Full textWoodiss-Field, Ashley, Michael N. Johnstone, and Paul Haskell-Dowland. "Examination of Traditional Botnet Detection on IoT-Based Bots." Sensors 24, no. 3 (2024): 1027. http://dx.doi.org/10.3390/s24031027.
Full textSaurabh Chauhan and Shreya Kapoor. "Sliding Puzzle CAPTCHA Analysis." International Journal for Modern Trends in Science and Technology 6, no. 12 (2020): 165–70. http://dx.doi.org/10.46501/ijmtst061232.
Full textJin, Rui, and Yong Liao. "Prevention Is Better than Cure: Exposing the Vulnerabilities of Social Bot Detectors with Realistic Simulations." Applied Sciences 15, no. 11 (2025): 6230. https://doi.org/10.3390/app15116230.
Full textKarthikayini, Thavasimani, and Kasturirangan Srinath Nuggehalli. "Hyperparameter optimization using custom genetic algorithm for classification of benign and malicious traffic on internet of things–23 dataset." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 4031–41. https://doi.org/10.11591/ijece.v12i4.pp4031-4041.
Full textSadeghpour, Shadi, and Natalija Vlajic. "Click Fraud in Digital Advertising: A Comprehensive Survey." Computers 10, no. 12 (2021): 164. http://dx.doi.org/10.3390/computers10120164.
Full textKadam*, Nitika, and Harish Patidar. "Social Media Fake Profile Detection Technique Based on Attribute Estimation and Content Analysis Method." International Journal of Recent Technology and Engineering (IJRTE) 8, no. 6 (2020): 4534–39. http://dx.doi.org/10.35940/ijrte.f8414.038620.
Full textKolomeets, Maxim, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova, and Andrey Chechulin. "Experimental Evaluation: Can Humans Recognise Social Media Bots?" Big Data and Cognitive Computing 8, no. 3 (2024): 24. http://dx.doi.org/10.3390/bdcc8030024.
Full textGuo, Qinglang, Haiyong Xie, Yangyang Li, Wen Ma, and Chao Zhang. "Social Bots Detection via Fusing BERT and Graph Convolutional Networks." Symmetry 14, no. 1 (2021): 30. http://dx.doi.org/10.3390/sym14010030.
Full textAl-Nawasrah, Ahmad, Ammar Ali Almomani, Samer Atawneh, and Mohammad Alauthman. "A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing." International Journal of Cloud Applications and Computing 10, no. 3 (2020): 17–53. http://dx.doi.org/10.4018/ijcac.2020070102.
Full textYamaguchi, Shingo. "Botnet Defense System: Concept, Design, and Basic Strategy." Information 11, no. 11 (2020): 516. http://dx.doi.org/10.3390/info11110516.
Full textAbdul Razak, Siti Fatimah, Ku Yee Fang, Noor Hisham Kamis, Anang Hudaya Muhammad Amin, and Sumendra Yogarayan. "Simulation of Vehicular Bots-Based DDoS Attacks in Connected Vehicles Networks." HighTech and Innovation Journal 4, no. 4 (2023): 854–69. http://dx.doi.org/10.28991/hij-2023-04-04-014.
Full textZhao, Chensu, Yang Xin, Xuefeng Li, Hongliang Zhu, Yixian Yang, and Yuling Chen. "An Attention-Based Graph Neural Network for Spam Bot Detection in Social Networks." Applied Sciences 10, no. 22 (2020): 8160. http://dx.doi.org/10.3390/app10228160.
Full text