Academic literature on the topic 'Malicious posts on Twitter'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malicious posts on Twitter.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malicious posts on Twitter"
Sopinti Chaitanya Raj and B.Srinivas.S.P.Kumar. "DETECTING MALICIOUS TWITTER BOTS USING MACHINE LEARNING." international journal of engineering technology and management sciences 6, no. 6 (2022): 382–88. http://dx.doi.org/10.46647/ijetms.2022.v06i06.068.
Full textIbrahim, Yasser, Mohammed Abdel Razek, and Nasser El-Sherbeny. "Social cyber-criminal, towards automatic real time recognition of malicious posts on Twitter." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 2 (2022): 1199. http://dx.doi.org/10.11591/ijeecs.v25.i2.pp1199-1207.
Full textAli, Yasser Ibrahim Abdelmonem, Mohammed Abdel Razek, and Nasser El-Sherbeny. "Social cyber-criminal, towards automatic real time recognition of malicious posts on Twitter." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 2 (2022): 1199–207. https://doi.org/10.11591/ijeecs.v25.i2.pp1199-1207.
Full textDhanesh, Arya, Jyothika K, Malavika Jayaraj, Nevin Jose Antony, and Anu Treesa George. "Comprehensive Strategies for Identifying X(Twitter) Bots." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43583.
Full textChang, Ying-Ying, Wei-Yao Wang, and Wen-Chih Peng. "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 1 (2024): 30–37. http://dx.doi.org/10.1609/aaai.v38i1.27752.
Full textAddawood, Aseel, Adam Badawy, Kristina Lerman, and Emilio Ferrara. "Linguistic Cues to Deception: Identifying Political Trolls on Social Media." Proceedings of the International AAAI Conference on Web and Social Media 13 (July 6, 2019): 15–25. http://dx.doi.org/10.1609/icwsm.v13i01.3205.
Full textRodrigues, Anisha P., Roshan Fernandes, Aakash A, et al. "Real-Time Twitter Spam Detection and Sentiment Analysis using Machine Learning and Deep Learning Techniques." Computational Intelligence and Neuroscience 2022 (April 15, 2022): 1–14. http://dx.doi.org/10.1155/2022/5211949.
Full textHerzallah, Wafa, Hossam Faris, and Omar Adwan. "Feature engineering for detecting spammers on Twitter: Modelling and analysis." Journal of Information Science 44, no. 2 (2017): 230–47. http://dx.doi.org/10.1177/0165551516684296.
Full textLeonardi, Simone, Giuseppe Rizzo, and Maurizio Morisio. "Automated Classification of Fake News Spreaders to Break the Misinformation Chain." Information 12, no. 6 (2021): 248. http://dx.doi.org/10.3390/info12060248.
Full textAnnisa, Fhena. "Ujaran Kebencian terhadap Artis K-Pop dalam Opening Ceremony FIFA World Cup 2022." Jurnal Komunikasi Global 12, no. 1 (2023): 71–97. http://dx.doi.org/10.24815/jkg.v12i1.31107.
Full textDissertations / Theses on the topic "Malicious posts on Twitter"
Cushing, Cailin. "DETECTING NETFLIX SERVICE OUTAGES THROUGH ANALYSIS OF TWITTER POSTS." DigitalCommons@CalPoly, 2012. https://digitalcommons.calpoly.edu/theses/723.
Full textNicklasson, Maja. "Posts with highest engagement! A study that identify posts on social media that generate most interactions by educational companies." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20209.
Full textAlghamdi, Bandar Abdulrahman. "Topic-based feature selection and a hybrid approach for detecting spammers on twitter." Thesis, Queensland University of Technology, 2020. https://eprints.qut.edu.au/204112/1/Bandar%20Abdulrahman%20A_Alghamdi_Thesis.pdf.
Full textNelzén, Amanda. "Aristotle on social media? : Investigating non-profit organizations’ usage of persuasive language in their posts on Twitter and Facebook." Thesis, Linnéuniversitetet, Institutionen för språk (SPR), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-70001.
Full textMohammed, Zuhura. "Crisis Communication and Management using SocialMedia: a Crisis Response to Ethiopian Airlines ET302 Crash." Thesis, Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-85637.
Full textVenkatesh, Rasula. "Malicious Accounts Detection Based on Short URLs in Twitter." Thesis, 2015. http://ethesis.nitrkl.ac.in/7787/1/2015_btech_malicious_venkatesh.pdf.
Full textRamalho, Miguel António Palma dos Santos Sozinho. "High-level Approaches to Detect Malicious Political Activity on Twitter." Master's thesis, 2020. https://hdl.handle.net/10216/128528.
Full textRamalho, Miguel António Palma dos Santos Sozinho. "High-level Approaches to Detect Malicious Political Activity on Twitter." Dissertação, 2020. https://hdl.handle.net/10216/128528.
Full textYang, Tzu-Hsuan, and 楊子萲. "Analyzing Social Network Data Using Deep Neural Networks: A Case Study Using Twitter Posts." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/wtqyh3.
Full text"A Critical Discourse Analysis of Twitter Posts on The Perspectives of Women Driving in Saudi Arabia." Master's thesis, 2017. http://hdl.handle.net/2286/R.I.45498.
Full textBooks on the topic "Malicious posts on Twitter"
Rogers, Richard. The Propagation of Misinformation in Social Media. Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463720762.
Full textRadians, George. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textGray, Davina. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textGray, Davina. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textGray, Davina. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textRadians, George. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textRadians, George. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textRadians, George. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textRadians, George. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textGray, Davina. Twitter Posts Planner: Organizer to Plan All Your Posts and Content. Lulu Press, Inc., 2021.
Find full textBook chapters on the topic "Malicious posts on Twitter"
Chiroma, Fatima, Mihaela Cocea, and Han Liu. "Detection of Suicidal Twitter Posts." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29933-0_26.
Full textAmato, Flora, Giovanni Cozzolino, Antonino Mazzeo, and Sara Romano. "Malicious Event Detecting in Twitter Communities." In Smart Innovation, Systems and Technologies. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39345-2_6.
Full textAzeez, Nureni Ayofe, Oluwadamilola Atiku, Sanjay Misra, Adewole Adewumi, Ravin Ahuja, and Robertas Damasevicius. "Detection of Malicious URLs on Twitter." In Lecture Notes in Electrical Engineering. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5558-9_29.
Full textFriginal, Eric, Oksana Waugh, and Ashley Titak. "Linguistic Variation in Facebook and Twitter Posts." In Studies in Corpus-Based Sociolinguistics. Routledge, 2017. http://dx.doi.org/10.4324/9781315527819-15.
Full textSatija, Tanu, and Nirmalya Kar. "Detecting Malicious Twitter Bots Using Machine Learning." In Advances in Computational Intelligence, Security and Internet of Things. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3666-3_16.
Full textChen, Zhouhan, Rima S. Tanash, Richard Stoll, and Devika Subramanian. "Hunting Malicious Bots on Twitter: An Unsupervised Approach." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67256-4_40.
Full textWang, Xiaofeng, Matthew S. Gerber, and Donald E. Brown. "Automatic Crime Prediction Using Events Extracted from Twitter Posts." In Social Computing, Behavioral - Cultural Modeling and Prediction. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29047-3_28.
Full textKajanan, Sangaralingam, Ahmed Shafeeq Bin Mohd Shariff, Kaushik Dutta, and Anindya Datta. "Resolving Name Conflicts for Mobile Apps in Twitter Posts." In Shaping the Future of ICT Research. Methods and Approaches. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35142-6_1.
Full textAdekotujo, Akinlolu Solomon, JooYoung Lee, Ayokunle Oluwatoyin Enikuomehin, Manuel Mazzara, and Segun Benjamin Aribisala. "Bi-lingual Intent Classification of Twitter Posts: A Roadmap." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-14687-0_1.
Full textBharany, Salil, Shadab Alam, Mohammed Shuaib, and Bhanu Talwar. "Sentiment Analysis of Twitter Data for COVID-19 Posts." In Data Intelligence and Cognitive Informatics. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-6004-8_37.
Full textConference papers on the topic "Malicious posts on Twitter"
Rahman, Hilmy, Yoggy Harisusilo Putra, Hisyam Syarif, Erick Delenia, Yulian Findawati, and Diana Purwitasari. "Dangerous Speech in Indonesian Twitter Posts: A Literature Review." In 2024 International Conference on Information Technology Research and Innovation (ICITRI). IEEE, 2024. http://dx.doi.org/10.1109/icitri62858.2024.10698923.
Full textBhale, Kanchan, and Thirupurasundari D. R. "Malicious Social Bot Detection in Twitter: A Review." In 2024 4th International Conference on Computer, Communication, Control & Information Technology (C3IT). IEEE, 2024. https://doi.org/10.1109/c3it60531.2024.10829441.
Full textKurnianingrum, Dian, Isma Addi Jumbri, Mila Andria Savitri, Nugraha Nugraha, Disman Disman, and Rachel Monica. "Decoding Financial Positivity: Sentiment Analysis of Mandiri Sekuritas's Twitter Posts." In 2024 6th International Conference on Cybernetics and Intelligent System (ICORIS). IEEE, 2024. https://doi.org/10.1109/icoris63540.2024.10903727.
Full textDivani, N., and A. Vinitha. "Machine Learning-Based Detection of Malicious URLs in Twitter." In 2025 International Conference on Machine Learning and Autonomous Systems (ICMLAS). IEEE, 2025. https://doi.org/10.1109/icmlas64557.2025.10968493.
Full textAcharya, Malika, and Shilpi Sharma. "Semantic Analysis of Twitter Posts." In 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS). IEEE, 2018. http://dx.doi.org/10.1109/ctems.2018.8769302.
Full textBates, Andrew, and Jugal Kalita. "Counting Clusters in Twitter Posts." In the Second International Conference. ACM Press, 2016. http://dx.doi.org/10.1145/2905055.2905295.
Full textWani, Kalpana, Aditya Patil, Sumedha Mukherjee, and Sushmita Sarkar. "Malicious Twitter Bot Detector." In 2021 4th Biennial International Conference on Nascent Technologies in Engineering (ICNTE). IEEE, 2021. http://dx.doi.org/10.1109/icnte51185.2021.9487674.
Full textMinot, Ariana S., Andrew Heier, Davis King, Olga Simek, and Nicholas Stanisha. "Searching for Twitter Posts by Location." In ICTIR '15: ACM SIGIR International Conference on the Theory of Information Retrieval. ACM, 2015. http://dx.doi.org/10.1145/2808194.2809480.
Full textWührl, Amelie, and Roman Klinger. "Claim Detection in Biomedical Twitter Posts." In Proceedings of the 20th Workshop on Biomedical Language Processing. Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.bionlp-1.15.
Full textHu, Pengwei, Chenhao Lin, Hui Su, et al. "BlueMemo: Depression Analysis through Twitter Posts." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/760.
Full textReports on the topic "Malicious posts on Twitter"
Meisser, Amelia. The Benefits and Drawbacks of Physical Activity According to Social Media: A Content Analysis of Celebrities' Posts on Twitter and Instagram. Portland State University Library, 2015. http://dx.doi.org/10.15760/honors.164.
Full textGraham, Timothy, and Katherine M. FitzGerald. Bots, Fake News and Election Conspiracies: Disinformation During the Republican Primary Debate and the Trump Interview. Queensland University of Technology, 2023. http://dx.doi.org/10.5204/rep.eprints.242533.
Full textEtu, Egbe-Etu, Asha Weinstein Agrawal, Imokhai Tenebe, Jordan Larot, and Dang Minh Nhu Nguyen. Misconduct on Public Transit: An Exploratory Analysis Using the Comments Formerly Known as Tweets. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2023.2317.
Full textWarren, Nancy, Pia Mingkwan, Caroline Kery, Meagan Meekins, Thomas Bukowski, and Laura Nyblade. Identifying and Classifying COVID-19 Stigma on Social Media. RTI Press, 2023. http://dx.doi.org/10.3768/rtipress.2023.op.0087.2305.
Full textDroogan, Julian, Lise Waldek, Brian Ballsun-Stanton, and Jade Hutchinson. Mapping a Social Media Ecosystem: Outlinking on Gab & Twitter Amongst the Australian Far-right Milieu. RESOLVE Network, 2022. http://dx.doi.org/10.37805/remve2022.6.
Full text