A Survey of Spam Detection Methods on Twitter
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 3
Abstract
Twitter is one of the most popular social media platforms that has 313 million monthly active users which post 500 million tweets per day. This popularity attracts the attention of spammers who use Twitter for their malicious aims such as phishing legitimate users or spreading malicious software and advertises through URLs shared within tweets, aggressively follow/unfollow legitimate users and hijack trending topics to attract their attention, propagating pornography. In August of 2014, Twitter revealed that 8.5% of its monthly active users which equals approximately 23 million users have automatically contacted their servers for regular updates. Thus, detecting and filtering spammers from legitimate users are mandatory in order to provide a spam-free environment in Twitter. In this paper, features of Twitter spam detection presented with discussing their effectiveness. Also, Twitter spam detection methods are categorized and discussed with their pros and cons. The outdated features of Twitter which are commonly used by Twitter spam detection approaches are highlighted. Some new features of Twitter which, to the best of our knowledge, have not been mentioned by any other works are also presented.
Authors and Affiliations
Abdullah Talha Kabakus, Resul Kara
Implementation of Location Base Service on Tourism Places in West Nusa Tenggara by using Smartphone
The study is aimed to create an application that can assist users in finding information about tourism places in West Nusa Tenggara, Indonesia. West Nusa Tenggara is one of the provinces in Indonesia and one of the secon...
Robust Modeling and Linearization of MIMO RF Power Amplifiers for 4G and 5G Applications
In this paper, a novel set of orthogonal crossover polynomials for the baseband modelling and linearization of MIMO RF Pas is presented. The proposed solution is applicable to WCDMA and LTE applications. The new modellin...
Toward a Hybrid Approach for Crowd Simulation
We address the problem of simulating pedestrian crowd behaviors in real time. To date, two approaches can be used in modeling and simulation of crowd behaviors, i.e. macroscopic and microscopic models. Microscopic simula...
Hierarchical Low Power Consumption Technique with Location Information for Sensor Networks
In the wireless sensor networks composed of battery-powered sensor nodes, one of the main issues is how to save power consumption at each node. The usual approach to this problem is to activate only necessary nodes (e.g....
Action Recognition using Key-Frame Features of Depth Sequence and ELM
Recently, the rapid development of inexpensive RGB-D sensor, like Microsoft Kinect, provides adequate information for human action recognition. In this paper, a recognition algorithm is presented in which feature represe...