{"title":"Cyberbullying and Cyberstalking on Online Social Networks","authors":"Umit Can, B. Alatas","doi":"10.1201/9781003134527-10","DOIUrl":"https://doi.org/10.1201/9781003134527-10","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point","authors":"M. Hasan, Md. Redwan Hossain, A. Pathan","doi":"10.1201/9781003134527-16","DOIUrl":"https://doi.org/10.1201/9781003134527-16","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Profiling Online Users","authors":"M. Mamun, Muhammad Al-Digeil, S. Ahmed","doi":"10.1201/9781003134527-14","DOIUrl":"https://doi.org/10.1201/9781003134527-14","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129323408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Vishnu, Basant Agarwal, P. Vinod, K. Dhanya, A. Baroni
{"title":"A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter","authors":"P. Vishnu, Basant Agarwal, P. Vinod, K. Dhanya, A. Baroni","doi":"10.1201/9781003134527-8","DOIUrl":"https://doi.org/10.1201/9781003134527-8","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"69 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131917116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19","authors":"Mohammad Shadab Khan, Sharyar Wani, Eima Fatima","doi":"10.1201/9781003134527-12","DOIUrl":"https://doi.org/10.1201/9781003134527-12","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Content Classification in Social Media Platforms","authors":"Thomas M. Chen","doi":"10.1201/9781003134527-6","DOIUrl":"https://doi.org/10.1201/9781003134527-6","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129503202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Tutorial on Cross-Site Scripting Attack","authors":"Vassilis Papaspirou, L. Maglaras, M. Ferrag","doi":"10.1201/9781003134527-17","DOIUrl":"https://doi.org/10.1201/9781003134527-17","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114194498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganographic Botnet C&C Channel Using Twitter","authors":"Nicholas Pantic, Mohammad Husain","doi":"10.1201/9781003134527-7","DOIUrl":"https://doi.org/10.1201/9781003134527-7","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122684236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}