[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
review-article

Learning textual features for Twitter spam detection: : A systematic literature review

Published: 15 October 2023 Publication History

Abstract

Background—Nowadays, with the rise of Internet access and mobile devices around the globe, more people are using social networks for collaboration and receiving real-time information. Twitter, the microblogging site that is becoming a critical source of communication, has also grabbed the attention of spammers to distract users. So far, researchers have introduced various defense techniques to detect spams and combat spammers’ activities. To overcome this problem, many novel techniques have been offered by researchers, which have greatly enhanced spam detection performance. Objective—The purpose of this paper is to identify, taxonomically classify, and compare current Twitter spam detection approaches in a systematic way. Method—This study presents a comprehensive Systematic Literature Review (SLR) method for spam detection on Twitter regarding 70 most relevant papers published between 2010 and October 2022. Literature review analysis reveals that most of the existing Twitter spam detection techniques are based on textual content and messages (tweets) that rely on Machine Learning (ML)-based algorithms. The major differences in these ML algorithms which use various classification and clustering algorithms are related to various feature selection methods. Hence, we propose a classification based on different feature selection analyses, namely content analysis, user analysis, tweet analysis, network analysis, and hybrid analysis. Results—Various parameters are identified to investigate the Twitter spam detection approaches, and each of the papers was examined to find the research methodology and present comparative studies on current approaches. Conclusion—This paper demonstrates that the existing Twitter spam detection approaches have encountered several open issues, including scalability, streaming data analysis, and processing. The most obvious unresolved issues are spam drift and non-English tweets.

References

[1]
V. Abhijith, C.P.S. Sravan, D. Raju, T. Sasikala, Detection of Malicious URLs in Twitter, Paper presented at the 2021 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), 2021.
[2]
S.B. Abkenar, M.H. Kashani, E. Mahdipour, S.M. Jameii, Big data analytics meets social media: A systematic review of techniques, open issues, and future directions, Telematics and Informatics 101517 (2020).
[3]
K.S. Adewole, T. Han, W. Wu, H. Song, A.K. Sangaiah, Twitter spam account detection based on clustering and classification methods, The Journal of Supercomputing (2018) 1–36.
[4]
K.S. Adewole, T. Han, W. Wu, H. Song, A.K. Sangaiah, Twitter spam account detection based on clustering and classification methods, The Journal of Supercomputing 76 (7) (2020) 4802–4837.
[5]
H. Afzal, K. Mehmood, Spam filtering of bi-lingual tweets using machine learning, Paper presented at the 2016 18th International Conference on Advanced Communication Technology (ICACT), 2016.
[6]
A. Aggarwal, M. Mittal, G. Battineni, Generative adversarial network: An overview of theory and applications, International Journal of Information Management Data Insights 1 (1) (2021).
[7]
S.B.S. Ahmad, M. Rafie, S.M. Ghorabie, Spam detection on Twitter using a support vector machine and users’ features by identifying their interactions, Multimedia Tools and Applications 80 (8) (2021) 11583–11605.
[8]
Z. Ahmadi, M. Haghi Kashani, M. Nikravan, E. Mahdipour, Fog-based healthcare systems: A systematic review, Multimedia Tools and Applications, 2021.
[9]
M. Akbari, X. Hu, N. Liqiang, T.-S. Chua, From tweets to wellness: Wellness event detection from twitter streams, Paper presented at the Thirtieth AAAI Conference on Artificial Intelligence, 2016.
[10]
S. Al-Azani, E.-S.-M. El-Alfy, Detection of Arabic Spam Tweets Using Word Embedding and Machine Learning, Paper presented at the 2018 International Conference on Innovation and Intelligence for Informatics, 2018, and Technologies (3ICT).
[11]
L. Alhaura, I. Budi, Malicious Account Detection on Indonesian Twitter Account, Paper presented at the 2020 3rd International Conference on Computer and Informatics Engineering (IC2IE), 2020.
[12]
H. Almerekhi, T. Elsayed, Detecting automatically-generated arabic tweets, Paper presented at the AIRS, 2015.
[13]
Z. Alom, B. Carminati, E. Ferrari, Detecting Spam Accounts on Twitter, Paper presented at the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018.
[14]
Z. Alom, B. Carminati, E. Ferrari, A deep learning model for Twitter spam detection, Online Social Networks and Media 18 (2020).
[15]
K. Anaswara, A. Saleema, V. Indu, An efficient approach for spammer detection on Twitter and their behavior analysis. Paper presented at the, IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2022.
[16]
D. Antonakaki, P. Fragopoulou, S. Ioannidis, A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks, Expert Systems with Applications 164 (2021).
[17]
M. Ashour, C. Salama, M.W. El-Kharashi, Detecting Spam Tweets using Character N-gram Features, Paper presented at the 2018 13th International Conference on Computer Engineering and Systems (ICCES), 2018.
[18]
A. Balfagih, V. Keselj, S. Taylor, N-gram and Word2Vec Feature Engineering Approaches for Spam Recognition on Some Influential Twitter Topics in Saudi Arabia, Paper presented at the Proceedings of the 6th International Conference on Information System and Data Mining, 2022.
[19]
Bazzaz Abkenar, S., Mahdipour, E., Jameii, S. M., & Haghi Kashani, M. 2021 A hybrid classification method for Twitter spam detection based on differential evolution and random forest. Concurrency and Computation: Practice and Experience, e6381.
[20]
Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010). Detecting spammers on twitter. Paper presented at the Collaboration, electronic messaging, anti-abuse and spam conference (CEAS).
[21]
P. Bindu, R. Mishra, P.S. Thilagam, Discovering spammer communities in Twitter, Journal of Intelligent Information Systems 51 (3) (2018) 503–527.
[22]
P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, Journal of systems and software 80 (4) (2007) 571–583.
[23]
C. Calero, M.F. Bertoa, M.Á. Moraga, A systematic literature review for software sustainability measures, Paper presented at the 2013 2nd international workshop on green and sustainable software (GREENS), 2013.
[24]
J.P. Carpenter, K.B.S. Willet, M.J. Koehler, S.P. Greenhalgh, Spam and Educators’ Twitter Use: Methodological Challenges and Considerations, TechTrends (2019) 1–10.
[25]
J.P. Carpenter, K.B.S. Willet, M.J. Koehler, S.P. Greenhalgh, Spam and educators’ Twitter use: Methodological challenges and considerations, TechTrends 64 (3) (2020) 460–469.
[26]
A. Chakraborty, J. Sundi, S. Satapathy, SPAM: A framework for social profile abuse monitoring, CSE508 report, Stony Brook University, Stony Brook, NY, 2012.
[27]
C. Chen, Y. Wang, J. Zhang, Y. Xiang, W. Zhou, G. Min, Statistical features-based real-time detection of drifted twitter spam, IEEE Transactions on Information Forensics and Security 12 (4) (2016) 914–925.
[28]
C. Chen, S. Wen, J. Zhang, Y. Xiang, J. Oliver, A. Alelaiwi, M.M. Hassan, Investigating the deceptive information in Twitter spam, Future Generation Computer Systems 72 (2017) 319–326.
[29]
C. Chen, J. Zhang, X. Chen, Y. Xiang, W. Zhou, 6 million spam tweets: A large ground truth for timely Twitter spam detection, Paper presented at the 2015 IEEE international conference on communications (ICC), 2015.
[30]
C. Chen, J. Zhang, Y. Xiang, W. Zhou, Asymmetric self-learning for tackling twitter spam drift, Paper presented at the Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on, 2015.
[31]
P.-C. Chen, H.-M. Lee, H.-R. Tyan, J.-S. Wu, T.-E. Wei, Detecting spam on Twitter via message-passing based on retweet-relation, Paper presented at the International Conference on Technologies and Applications of Artificial Intelligence (2014).
[32]
Z. Chu, I. Widjaja, H. Wang, Detecting social spam campaigns on twitter, Paper presented at the International Conference on Applied Cryptography and Network Security, 2012.
[33]
O. Çıtlak, M. Dörterler, İ.A. Doğru, A survey on detecting spam accounts on Twitter network, Social Network Analysis and Mining 9 (1) (2019) 35.
[34]
F. Concone, G.L. Re, M. Morana, C. Ruocco, Assisted Labeling for Spam Account Detection on Twitter, Paper presented at the 2019 IEEE International Conference on Smart Computing (SMARTCOMP), 2019.
[35]
M. Crawford, T.M. Khoshgoftaar, J.D. Prusa, A.N. Richter, H. Al Najada, Survey of review spam detection using machine learning techniques, Journal of Big Data 2 (1) (2015) 1–24.
[36]
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, M. Tesconi, Fame for sale: Efficient detection of fake Twitter followers, Decision Support Systems 80 (2015) 56–71.
[37]
S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, M. Tesconi, The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race, Paper presented at the Proceedings of the 26th international conference on world wide web companion, 2017.
[38]
W. Daffa, O. Bamasag, A. AlMansour, A Survey On Spam URLs Detection In Twitter, Paper presented at the 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018.
[39]
D. Dhaka, M. Mehrotra, Cross-Domain Spam Detection in Social Media: A Survey, Paper presented at the International Conference on Emerging Technologies in Computer Engineering, 2019.
[40]
N. Eshraqi, M. Jalali, M.H. Moattar, Spam detection in social networks: A review, Paper presented at the 2015 International Congress on Technology, Communication and Knowledge (ICTCK), 2015.
[41]
M. Etemadi, S. Bazzaz Abkenar, A. Ahmadzadeh, M. Haghi Kashani, P. Asghari, M. Akbari, E. Mahdipour, A systematic review of healthcare recommender systems: Open issues, challenges, and techniques, Expert Systems with Applications 213 (2023).
[42]
M. Fathi, M. Haghi Kashani, S.M. Jameii, E. Mahdipour, Big Data Analytics in Weather Forecasting: A Systematic Review, Archives of Computational Methods in Engineering. (2021).
[43]
S. Gera, A. Sinha, A machine learning-based malicious bot detection framework for trend-centric twitter stream, Journal of Discrete Mathematical Sciences and Cryptography 24 (5) (2021) 1337–1348.
[44]
S. Gheewala, R. Patel, Machine Learning Based Twitter Spam Account Detection: A Review, Paper presented at the 2018 Second International Conference on Computing Methodologies and Communication (ICCMC), 2018.
[45]
D. Guo, C. Chen, Detecting non-personal and spam users on geo-tagged Twitter network, Transactions in GIS 18 (3) (2014) 370–384.
[46]
S. Gupta, A. Khattar, A. Gogia, P. Kumaraguru, T. Chakraborty, Collective classification of spam campaigners on Twitter: A hierarchical meta-path based approach, Paper presented at the Proceedings of the 2018 World Wide Web Conference, 2018.
[47]
M. Haghi Kashani, M. Ebrahim, Load Balancing Algorithms in Fog Computing, IEEE Transactions on Services Computing 16 (2) (2023) 1505–1521.
[48]
M. Haghi Kashani, M. Madanipour, M. Nikravan, P. Asghari, E. Mahdipour, A systematic review of IoT in healthcare: Applications, techniques, and trends, Journal of Network and Computer Applications 192 (2021).
[49]
M. Haghi Kashani, A.M. Rahmani, N. Jafari Navimipour, Quality of service-aware approaches in fog computing, International Journal of Communication Systems e4340 (2020).
[50]
B. Halawi, A. Mourad, H. Otrok, E. Damiani, Few are as good as many: An Ontology-based tweet spam detection approach, IEEE Access 6 (2018) 63890–63904.
[51]
Ho, K., Liesaputra, V., Yongchareon, S., & Mohaghegh, M. (2017). A framework for evaluating anti spammer systems for Twitter. Paper presented at the OTM Confederated International Conferences“ On the Move to Meaningful Internet Systems”.
[52]
Hua, W., & Zhang, Y. (2013). Threshold and associative based classification for social spam profile detection on twitter. Paper presented at the 2013 Ninth International Conference on Semantics, Knowledge and Grids.
[53]
L. Ilias, I. Roussaki, Detecting malicious activity in Twitter using deep learning techniques, Applied Soft Computing 107 (2021).
[54]
N.H. Imam, V.G. Vassilakis, A Survey of Attacks Against Twitter Spam Detectors in an Adversarial Environment, Robotics 8 (3) (2019) 50.
[55]
I. Inuwa-Dutse, M. Liptrott, I. Korkontzelos, Detection of spam-posting accounts on Twitter, Neurocomputing 315 (2018) 496–511.
[56]
P. Jamshidi, A. Ahmad, C. Pahl, Cloud migration research: A systematic review, IEEE Transactions on Cloud Computing 1 (2) (2013) 142–157.
[57]
A.T. Kabakus, R. Kara, A Survey of Spam Detection Methods on Twitter, International Journal of Advanced Computer Science and Applications 8 (3) (2017).
[58]
B.A. Kamoru, A. Jaafar, M.B. Jabar, M.A. Murad, A mapping study to investigate spam detection on social networks, International Journal of Applied Information Systems 11 (11) (2017) 16–31.
[59]
Karakaşlı, M. S., Aydin, M. A., Yarkan, S., & Boyaci, A. (2019). Dynamic Feature Selection for Spam Detection in Twitter. Paper presented at the International Telecommunications Conference.
[60]
Kardaş, B., Bayar, İ. E., Özyer, T., & Alhajj, R. (2021). Detecting spam tweets using machine learning and effective preprocessing. Paper presented at the Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[61]
Y. Karimi, M. Haghi Kashani, M. Akbari, E. Mahdipour, Leveraging big data in smart cities: A systematic review, Concurrency and Computation: Practice and Experience n/a(n/a) (2021) e6379.
[62]
Kaur, P., Singhal, A., & Kaur, J. (2016). Spam detection on Twitter: a survey. Paper presented at the Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on.
[63]
R. Kaur, S. Singh, H. Kumar, Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches, Journal of Network and Computer Applications 112 (2018) 53–88.
[64]
Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering.
[65]
Krithiga, R., & Ilavarasan, E. (2019). A Comprehensive Survey of Spam Profile Detection Methods in Online Social Networks. Paper presented at the Journal of Physics: Conference Series.
[66]
R. Krithiga, E. Ilavarasan, A Novel Hybrid Algorithm to Classify Spam Profiles in Twitter, Webology 17 (1) (2020) 260–279.
[67]
R. Krithiga, E. Ilavarasan, A Reliable Modified Whale Optimization Algorithm based Approach for Feature Selection to Classify Twitter Spam Profiles, Microprocessors and Microsystems 103451 (2020).
[68]
A. Kumar, M. Singh, A.R. Pais, Fuzzy String Matching Algorithm for Spam Detection in Twitter, Paper presented at the International Conference on Security & Privacy, 2019.
[69]
kumari Mukiri, R., & Babu, B. V. (2021). Prediction of rumour source identification through spam detection on social Networks-A survey. Materials Today: Proceedings.
[70]
Lalitha, L., Hulipalled, V. R., & Venugopal, K. (2017). Spamming the mainstream: A survey on trending Twitter spam detection techniques. Paper presented at the Smart Technologies For Smart Nation (SmartTechCon), 2017 International Conference On.
[71]
Lee, K., Caverlee, J., & Webb, S. (2010). Uncovering social spammers: social honeypots+ machine learning. Paper presented at the Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval.
[72]
Lee, K., Eoff, B. D., & Caverlee, J. (2011). Seven months with the devils: A long-term study of content polluters on twitter. Paper presented at the Fifth international AAAI conference on weblogs and social media.
[73]
C. Li, S. Liu, A comparative study of the class imbalance problem in Twitter spam detection, Concurrency and Computation: Practice and Experience 30 (5) (2018) e4281.
[74]
J. Li, P. Lv, W. Xiao, L. Yang, P. Zhang, Exploring groups of opinion spam using sentiment analysis guided by nominated topics, Expert Systems with Applications 171 (2021).
[75]
S.W. Liew, N.F.M. Sani, M.T. Abdullah, R. Yaakob, M.Y. Sharum, An effective security alert mechanism for real-time phishing tweet detection on Twitter, Computers & Security 83 (2019) 201–207.
[76]
G. Lin, N. Sun, S. Nepal, J. Zhang, Y. Xiang, H. Hassan, Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability, IEEE Access 5 (2017) 11142–11154.
[77]
Lin, P.-C., & Huang, P.-M. (2013). A study of effective features for detecting long-surviving Twitter spam accounts. Paper presented at the 2013 15th International Conference on Advanced Communications Technology (ICACT).
[78]
Lingam, G., Rout, R. R., & Somayajulu, D. (2018). Detection of social botnet using a trust model based on spam content in twitter network. Paper presented at the 2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS).
[79]
C.-Y. Liu, M.-S. Chen, C.-Y. Tseng, Incrests: Towards real-time incremental short text summarization on comment streams from social network services, IEEE Transactions on Knowledge and Data Engineering 27 (11) (2015) 2986–3000.
[80]
S. Liu, Y. Wang, J. Zhang, C. Chen, Y. Xiang, Addressing the class imbalance problem in twitter spam detection using ensemble learning, Computers & Security 69 (2017) 35–49.
[81]
Liu, S., Zhang, J., & Xiang, Y. (2016). Statistical detection of online drifting twitter spam. Paper presented at the Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security.
[82]
S. Madisetty, M.S. Desarkar, A Neural Network-Based Ensemble Approach for Spam Detection in Twitter, IEEE Transactions on Computational Social Systems 5 (4) (2018) 973–984.
[83]
Manasa, P., Malik, A., Batrac, I., & Luhach, A. K. (2021). A Comparative Study on Twitter Spam Detection Using Deep Learning Techniques.
[84]
J. Martinez-Romo, L. Araujo, Detecting malicious tweets in trending topics using a statistical analysis of language, Expert Systems with Applications 40 (8) (2013) 2992–3000.
[85]
Mateen, M., Iqbal, M. A., Aleem, M., & Islam, M. A. (2017). A hybrid approach for spam detection for Twitter. Paper presented at the Applied Sciences and Technology (IBCAST), 2017 14th International Bhurban Conference on.
[86]
Mccord, M., & Chuah, M. (2011). Spam detection on twitter using traditional classifiers. Paper presented at the international conference on Autonomic and trusted computing.
[87]
Z. Miller, B. Dickinson, W. Deitrick, W. Hu, A.H. Wang, Twitter spammer detection using data stream clustering, Information Sciences 260 (2014) 64–73.
[88]
N.S. Murugan, G.U. Devi, Detecting Streaming of Twitter Spam Using Hybrid Method, Wireless Personal Communications (2018) 1–22.
[89]
Neha, M., & Nair, M. S. (2021). A novel twitter spam detection technique by integrating inception network with attention based lstm. Paper presented at the 2021 5th International Conference on Trends in Electronics and Informatics (ICOEI).
[90]
Nemati, S., Haghi Kashani, M., & Faghih Mirzaee, R. (2023). Comprehensive survey of ternary full adders: Statistics, corrections, and assessments. IET Circuits, Devices & Systems, n/a(n/a).
[91]
M. Nikravan, M. Haghi Kashani, A review on trust management in fog/edge computing: Techniques, trends, and challenges, Journal of Network and Computer Applications 204 (2022).
[92]
Nilizadeh, S., Labrèche, F., Sedighian, A., Zand, A., Fernandez, J., Kruegel, C., . . . Vigna, G. (2017). Poised: Spotting twitter spam off the beaten paths. Paper presented at the Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
[93]
M. Petticrew, H. Roberts, Systematic reviews in the social sciences: A practical guide, John Wiley & Sons, 2008.
[94]
M. Rahimi, M. Songhorabadi, M.H. Kashani, Fog-based smart homes: A systematic review, Journal of Network and Computer Applications 102531 (2020).
[95]
S. Rao, A.K. Verma, T. Bhatia, A review on social spam detection: Challenges, open issues, and future directions, Expert Systems with Applications 115742 (2021).
[96]
K. Robinson, V. Mago, Birds of prey: Identifying lexical irregularities in spam on Twitter, Wireless Networks (2018) 1–8.
[97]
R.R. Rout, G. Lingam, D. Somayajulu, Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network, IEEE Transactions on Computational Social Systems. (2020).
[98]
S.R. Sahoo, B. Gupta, Hybrid approach for detection of malicious profiles in twitter, Computers & Electrical Engineering 76 (2019) 65–81.
[99]
Santos, I., Miñambres-Marcos, I., Laorden, C., Galán-García, P., Santamaría-Ibirika, A., & Bringas, P. G. (2014). Twitter content-based spam filtering. Paper presented at the International Joint Conference SOCO’13-CISIS’13-ICEUTE’13.
[100]
Sedhai, S., & Sun, A. (2015). Hspam14: A collection of 14 million tweets for hashtag-oriented spam research. Paper presented at the Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval.
[101]
S. Sedhai, A. Sun, Semi-supervised spam detection in Twitter stream, IEEE Transactions on Computational Social Systems 5 (1) (2017) 169–175.
[102]
M. Sheikh Sofla, M. Haghi Kashani, E. Mahdipour, R. Faghih Mirzaee, Towards effective offloading mechanisms in fog computing, Multimedia Tools and Applications 81 (2) (2022) 1997–2042.
[103]
Singh, M. (2021). Analysis of Twitter Spam Detection Techniques-A Review. Paper presented at the 2021 International Conference on Technological Advancements and Innovations (ICTAI).
[104]
M. Singh, D. Bansal, S. Sofat, Who is who on twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time, Cybernetics and Systems 49 (1) (2018) 1–25.
[105]
Sinha, P., Maini, O., Malik, G., & Kaushal, R. (2016). Ecosystem of spamming on Twitter: Analysis of spam reporters and spam reportees. Paper presented at the Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on.
[106]
Soman, S. J., & Murugappan, S. (2014a). Detecting malicious tweets in trending topics using clustering and classification. Paper presented at the 2014 International Conference on Recent Trends in Information Technology.
[107]
S.J. Soman, S. Murugappan, A study of Spam Detection Algorithm On Social Media networks, Journal of Computer Science 10 (10) (2014) 2135.
[108]
Song, J., Lee, S., & Kim, J. (2011). Spam filtering in twitter using sender-receiver relationship. Paper presented at the International workshop on recent advances in intrusion detection.
[109]
M. Songhorabadi, M. Rahimi, A. MoghadamFarid, M. Haghi Kashani, Fog computing approaches in IoT-enabled smart cities, Journal of Network and Computer Applications 211 (2023).
[110]
N. Spirin, J. Han, Survey on web spam detection: Principles and algorithms, Acm Sigkdd Explorations Newsletter 13 (2) (2012) 50–64.
[111]
Stafford, G., & Yu, L. L. (2013). An evaluation of the effect of spam on twitter trending topics. Paper presented at the 2013 International Conference on Social Computing.
[112]
Stringhini, G., Kruegel, C., & Vigna, G. (2010). Detecting spammers on social networks. Paper presented at the Proceedings of the 26th annual computer security applications conference.
[113]
N. Sun, G. Lin, J. Qiu, P. Rimba, Near real-time twitter spam detection with machine learning techniques, International Journal of Computers and Applications (2020) 1–11.
[114]
N. Ta, K. Li, Y. Yang, F. Jiao, Z. Tang, G. Li, Evaluating Public Anxiety for Topic-based Communities in Social Networks, IEEE Transactions on Knowledge and Data Engineering (2020).
[115]
H. Tajalizadeh, R. Boostani, A novel stream clustering framework for spam detection in twitter, IEEE Transactions on Computational Social Systems 6 (3) (2019) 525–534.
[116]
Tang, S., Mi, X., Li, Y., Wang, X., & Chen, K. (2022). Clues in tweets: Twitter-guided discovery and analysis of SMS spam. Paper presented at the Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
[117]
Tao, K., Abel, F., Hauff, C., Houben, G.-J., & Gadiraju, U. (2013). Groundhog day: near-duplicate detection on twitter. Paper presented at the Proceedings of the 22nd international conference on World Wide Web.
[118]
Thomas, K., Grier, C., Song, D., & Paxson, V. (2011). Suspended accounts in retrospect: an analysis of twitter spam. Paper presented at the Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference.
[119]
Tur, G., & Homsi, M. N. (2017). Cost-sensitive classifier for spam detection on news media Twitter accounts. Paper presented at the Computer Conference (CLEI), 2017 XLIII Latin American.
[120]
Venkatesh, R., Rout, J. K., & Jena, S. (2017). Malicious Account Detection Based on Short URLs in Twitter. Paper presented at the Proceedings of the International Conference on Signal, Networks, Computing, and Systems.
[121]
Venkateswarlu, B., & Shenoi, V. (2021). Optimized generative adversarial network with fractional calculus based feature fusion using Twitter stream for spam detection.
[122]
M. Verma, S. Sofat, Techniques to detect spammers in twitter-a survey, International Journal of Computer Applications 85 (10) (2014).
[123]
Wang, A. H. (2010a). Don't follow me: Spam detection in twitter. Paper presented at the 2010 international conference on security and cryptography (SECRYPT).
[124]
Wang, A. H. (2010b). Machine learning for the detection of spam in twitter networks. Paper presented at the International Conference on E-Business and Telecommunications.
[125]
Wang, D., Navathe, S. B., Liu, L., Irani, D., Tamersoy, A., & Pu, C. (2013). Click traffic analysis of short url spam on twitter. Paper presented at the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[126]
X. Wang, Q. Kang, J. An, M. Zhou, Drifted Twitter Spam Classification Using Multiscale Detection Test on KL Divergence, IEEE Access 7 (2019) 108384–108394.
[127]
Washha, M., Qaroush, A., Mezghani, M., & Sedes, F. (2017a). Information quality in social networks: A collaborative method for detecting spam tweets in trending topics. Paper presented at the International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems.
[128]
M. Washha, A. Qaroush, M. Mezghani, F. Sedes, A topic-based hidden markov model for real-time spam tweets filtering, Procedia Computer Science 112 (2017) 833–843.
[129]
T. Wu, S. Wen, Y. Xiang, W. Zhou, Twitter spam detection: Survey of new approaches and comparative study, Computers & Security 76 (2018) 265–284.
[130]
C. Yang, R. Harkreader, G. Gu, Empirical evaluation and new design for fighting evolving twitter spammers, IEEE Transactions on Information Forensics and Security 8 (8) (2013) 1280–1293.
[131]
Yang, C., Harkreader, R., Zhang, J., Shin, S., & Gu, G. (2012). Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. Paper presented at the Proceedings of the 21st international conference on World Wide Web.
[132]
H. Zhang, M.A. Babar, Systematic reviews in software engineering: An empirical investigation, Information and Software Technology 55 (7) (2013) 1341–1354.
[133]
Zhang, X., Zhu, S., & Liang, W. (2012). Detecting spam and promoting campaigns in the twitter social network. Paper presented at the 2012 IEEE 12th international conference on data mining.
[134]
Zhang, Y., Zhang, H., Yuan, X., & Tzeng, N.-F. (2019). TweetScore: Scoring Tweets via Social Attribute Relationships for Twitter Spammer Detection. Paper presented at the Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security.

Cited By

View all
  • (2024)Towards Transparent CybersecurityProcedia Computer Science10.1016/j.procs.2024.05.046236:C(394-401)Online publication date: 24-Jul-2024
  • (2024)Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learningInternational Journal of Information Security10.1007/s10207-023-00796-723:2(1359-1388)Online publication date: 1-Apr-2024

Index Terms

  1. Learning textual features for Twitter spam detection: A systematic literature review
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Expert Systems with Applications: An International Journal
            Expert Systems with Applications: An International Journal  Volume 228, Issue C
            Oct 2023
            1608 pages

            Publisher

            Pergamon Press, Inc.

            United States

            Publication History

            Published: 15 October 2023

            Author Tags

            1. Spam
            2. Twitter
            3. Machine learning
            4. Social networks
            5. Systematic literature review

            Qualifiers

            • Review-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 01 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Towards Transparent CybersecurityProcedia Computer Science10.1016/j.procs.2024.05.046236:C(394-401)Online publication date: 24-Jul-2024
            • (2024)Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learningInternational Journal of Information Security10.1007/s10207-023-00796-723:2(1359-1388)Online publication date: 1-Apr-2024

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media