Bossetta, 2018 - Google Patents
A simulated cyberattack on Twitter: Assessing partisan vulnerability to spear phishing and disinformation ahead of the 2018 US midterm electionsBossetta, 2018
View PDF- Document ID
- 9126406353093134215
- Author
- Bossetta M
- Publication year
- Publication venue
- arXiv preprint arXiv:1811.05900
External Links
Snippet
State-sponsored" bad actors" increasingly weaponize social media platforms to launch cyberattacks and disinformation campaigns during elections. Social media companies, due to their rapid growth and scale, struggle to prevent the weaponization of their platforms. This …
- 238000000034 method 0 description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/53—Centralised arrangements for recording incoming messages, i.e. mailbox systems
- H04M3/5322—Centralised arrangements for recording incoming messages, i.e. mailbox systems for recording text messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ghazi-Tehrani et al. | Phishing evolves: Analyzing the enduring cybercrime | |
| Soomro et al. | Social media-related cybercrimes and techniques for their prevention | |
| Fire et al. | Online social networks: threats and solutions | |
| Benjamin et al. | Examining hacker participation length in cybercriminal internet-relay-chat communities | |
| Rawat et al. | Applications of social network analysis to managing the investigation of suspicious activities in social media platforms | |
| Steffens | Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage | |
| US11403400B2 (en) | Troll account detection | |
| US11134097B2 (en) | Automated social account removal | |
| Alharbi et al. | Social media identity deception detection: a survey | |
| US20190068632A1 (en) | Malicious social media account identification | |
| Bartholomew et al. | Wave your false flags! deception tactics muddying attribution in targeted attacks | |
| Shires | Hack-and-leak operations: intrusion and influence in the Gulf | |
| Bossetta | A simulated cyberattack on Twitter: Assessing partisan vulnerability to spear phishing and disinformation ahead of the 2018 US midterm elections | |
| US20190036937A1 (en) | Social network page protection | |
| Hassan et al. | Digital privacy and security using Windows: A practical guide | |
| US10868824B2 (en) | Organizational social threat reporting | |
| Algarni et al. | Social engineering in social networking sites: Phase-based and source-based models | |
| Imtiaz et al. | Analysis of cybersecurity measures for detection, prevention, and misbehaviour of social systems | |
| Yadav | Social automation and APT attributions in national cybersecurity | |
| Samermit et al. | {“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators | |
| Khadka et al. | A survey on the principles of persuasion as a social engineering strategy in phishing | |
| Rao et al. | Evolving cyber threats, combating techniques, and open issues in online social networks | |
| Sun et al. | From victims to defenders: an exploration of the phishing attack reporting ecosystem | |
| Gupta et al. | Abusing phone numbers and cross-application features for crafting targeted attacks | |
| Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology |