{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:39:44Z","timestamp":1758271184265},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T00:00:00Z","timestamp":1703635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T00:00:00Z","timestamp":1703635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00796-7","type":"journal-article","created":{"date-parts":[[2023,12,27]],"date-time":"2023-12-27T22:02:36Z","timestamp":1703714556000},"page":"1359-1388","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning"],"prefix":"10.1007","volume":"23","author":[{"given":"Fatna","family":"El Mendili","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Fattah","sequence":"additional","affiliation":[]},{"given":"Nisrine","family":"Berros","sequence":"additional","affiliation":[]},{"given":"Youness","family":"Filaly","sequence":"additional","affiliation":[]},{"given":"Youn\u00e8s","family":"El Bouzekri El Idrissi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,27]]},"reference":[{"key":"796_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4209","volume-title":"Detecting Spamming Activities in Twitter Based on Deep-Learning Technique","author":"T Wu","year":"2017","unstructured":"Wu, T., Wen, S., Liu, S., Zhang, J., Xiang, Y., Alrubaian, M., Hassan, M.M.: Detecting Spamming Activities in Twitter Based on Deep-Learning Technique. Wiley, New York (2017)"},{"key":"796_CR2","doi-asserted-by":"crossref","unstructured":"Eshete, B., Villafiorita, A., Weldemariam, K.,Binspect: holistic analysis and detection of malicious web pages. In: Security and Privacy in Communication Networks, pp. 149\u2013166. Springer (2013)","DOI":"10.1007\/978-3-642-36883-7_10"},{"key":"796_CR3","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: Phishari: automatic real-time phishing detection on Twitter. In: eCrime Researchers Summit (eCrime), 2012, pp. 1\u201312. IEEE (2012)","DOI":"10.1109\/eCrime.2012.6489521"},{"key":"796_CR4","doi-asserted-by":"crossref","unstructured":"Eshete, B., Villafiorita, A., Weldemariam, K.: Einspect: Evolution-guided analaysis and detection of malicious web pages. Fondazione Bruno Kessler, Technical Report (2012)","DOI":"10.1109\/COMPSAC.2013.63"},{"key":"796_CR5","unstructured":"Rahman, M.S., Huang, T.-K., Madhyastha, H.V., Faloutsos, M.: Efficient and scalable socware detection in online social networks. In: USENIX Security (2012)"},{"key":"796_CR6","unstructured":"Kemp, S.: Digital in 2017: Global Overview, accessed on Jan. 24 (2017). https:\/\/wearesocial.com\/special-reports\/digital-in-2017-global-overview"},{"key":"796_CR7","unstructured":"ISACA. Advanced Persistent Threat Awareness, accessed on (2013). http:\/\/www.trendmicro.com\/cloudcontent\/us\/pdfs\/business\/datasheets\/wp_apt-survey-report.pdf"},{"key":"796_CR8","unstructured":"Ahmad. How Many Internet and #SocialMedia Users are Fake? accessed on Apr. 2 (2015). http:\/\/www.digitalinformationworld.com\/2015\/04\/infographic-how-many-internetsusers-are-fake.html"},{"key":"796_CR9","doi-asserted-by":"crossref","unstructured":"Neeraja, M., Prakash, J.: Computer science and engineering, MITE Moodabidri, India, detecting malicious posts in social networks using text analysis. Int. J. Sci. Res. (IJSR) 5(6) (2016)","DOI":"10.21275\/v5i6.NOV164091"},{"key":"796_CR10","unstructured":"Jasek, R., Kolarik, M., Vymola, T.: APT detection system using honeypots. In: Proceedings of the 13th International Conference on Application Information Communication (AIC), pp. 25\u201329 (2013)"},{"key":"796_CR11","doi-asserted-by":"publisher","unstructured":"Paradise, A., et al.: Cration et gestion de pots de miel de rseaux sociaux pour dtecter les cyberattaques cibles. dans IEEE Trans. Comput. Soc. Syst. 4(3), 65\u201379 (2017) https:\/\/doi.org\/10.1109\/TCSS.2017.2719705","DOI":"10.1109\/TCSS.2017.2719705"},{"key":"796_CR12","doi-asserted-by":"publisher","unstructured":"Zhu, Q., Clark, A., Poovendran, R., Baar, T.: Deployment and exploitation of deceptive honeybots in social networks. In: 52nd IEEE Conference on Decision and Control, Firenze, Italy, pp. 212\u2013219 (2013) https:\/\/doi.org\/10.1109\/CDC.2013.6759884","DOI":"10.1109\/CDC.2013.6759884"},{"key":"796_CR13","unstructured":"Webb, S., Caverlee, J., Pu, C.: Social honeypots: Making friends with a spammer near you, presented at the CEAS. California, CA, USA (2008)"},{"key":"796_CR14","unstructured":"Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: Proceedings, pp. 1\u20138. Barcelona, Spain, Jul, ICWSM (2011)"},{"key":"796_CR15","unstructured":"Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: Compa: Detecting compromised accounts on social networks. In: NDSS (2013)"},{"issue":"8","key":"796_CR16","doi-asserted-by":"publisher","first-page":"29923000","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 29923000 (2013)","journal-title":"Expert Syst. Appl."},{"key":"796_CR17","unstructured":"Yardi, S., Romero, D., Schoenebeck, G., et al.: Detecting spam in a twitter network. First Monday 15(1)"},{"key":"796_CR18","unstructured":"Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: Compa: Detecting compromised accounts on social networks. In: NDSS (2013)"},{"key":"796_CR19","doi-asserted-by":"crossref","unstructured":"Gao, H., Yang, Y., Bu, K., Chen, Y., Downey, D., Lee, K., Choudhary, A.: Spam ain\u2019t as diverse as it seems: throttling osn spam with templates underneath. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 7685. ACM (2014)","DOI":"10.1145\/2664243.2664251"},{"issue":"1","key":"796_CR20","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. SIGKDD Explor. Newsl. 19(1), 22\u201336 (2017). https:\/\/doi.org\/10.1145\/3137597.3137600","journal-title":"SIGKDD Explor. Newsl."},{"key":"796_CR21","doi-asserted-by":"publisher","unstructured":"Zhou, X., Zafarani, R., Shu, K., Liu, H.: Fake news: fundamental theories, detection strategies and challenges. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (WSDM \u201919). Association for Computing Machinery, New York, pp. 836\u2013837 (2019) https:\/\/doi.org\/10.1145\/3289600.3291382","DOI":"10.1145\/3289600.3291382"},{"key":"796_CR22","doi-asserted-by":"publisher","first-page":"11765","DOI":"10.1007\/s11042-020-10183-2","volume":"80","author":"RK Kaliyar","year":"2021","unstructured":"Kaliyar, R.K., Goswami, A., Narang, P.: FakeBERT: fake news detection in social media with a BERT-based deep learning approach. Multimed Tools Appl. 80, 11765\u201311788 (2021). https:\/\/doi.org\/10.1007\/s11042-020-10183-2","journal-title":"Multimed Tools Appl."},{"key":"796_CR23","doi-asserted-by":"publisher","unstructured":"Sansonetti, G., Gasparetti, F., D\u2019aniello et G., Micarelli, A.: Dtection d\u2019utilisateurs non fiables dans les mdias sociaux : techniques d\u2019apprentissage en profondeur pour la dtection automatique. dans IEEE Access 8, 213154\u2013213167 (2020), https:\/\/doi.org\/10.1109\/ACCESS.2020.3040604","DOI":"10.1109\/ACCESS.2020.3040604"},{"key":"796_CR24","doi-asserted-by":"publisher","unstructured":"Elyashar, A., Bendahan, J., Puzis, R., Sanmateu, M.-A.: Measurement of online discussion authenticity within online social media. In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 (ASONAM \u201917). Association for Computing Machinery, New York, pp. 627\u2013629. (2017) https:\/\/doi.org\/10.1145\/3110025.3110115","DOI":"10.1145\/3110025.3110115"},{"key":"796_CR25","doi-asserted-by":"publisher","unstructured":"Maurya, S.K., Singh, D.: et Maurya, AK Approches de dtection du spam d\u2019opinion trompeuse: une tude documentaire. Appl. Intell. 53, 2189\u20132234 (2023). https:\/\/doi.org\/10.1007\/s10489-022-03427-1","DOI":"10.1007\/s10489-022-03427-1"},{"key":"796_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120366","author":"SB Abkenar","year":"2023","unstructured":"Abkenar, S.B., Kashani, M.H., Akbari, M., Mahdipour, E.: Learning textual features for Twitter spam detection: a systematic literature review. Expert Syst. Appl. C (2023). https:\/\/doi.org\/10.1016\/j.eswa.2023.120366","journal-title":"Expert Syst. Appl. C"},{"key":"796_CR27","unstructured":"Chakraborty, A., Sundi, J., Satapathy, S.: Spam: A framework for social profile abuse monitoring. Technical report, Department of Computer Science, Stony Brook University, Stony Brook (2012)"},{"key":"796_CR28","doi-asserted-by":"crossref","unstructured":"Miller, Z., Dickinson, B., Deitrick, W., Hu, W., Wang, A.H.: Twitter spammer detection using data stream clustering. Technical report, Department of Computer Science, Houghton (2014)","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"796_CR29","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 435-442. ACM (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"796_CR30","doi-asserted-by":"crossref","unstructured":"Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Detecting suspicious following behavior in multimillion-node social networks. In: Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, pp. 305\u2013306 (2014)","DOI":"10.1145\/2567948.2577306"},{"key":"796_CR31","doi-asserted-by":"publisher","unstructured":"Gao, T., Yang, J., Peng, W., Jiang, L., Sun et Y., Li, F.: Une mthode base sur le contenu pour la dtection de Sybil dans les rseaux sociaux en ligne via l\u2019apprentissage en profondeur. dans IEEE Access 8, 38753\u201338766 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2975877","DOI":"10.1109\/ACCESS.2020.2975877"},{"key":"796_CR32","doi-asserted-by":"publisher","unstructured":"Ekosputra, M.J., Susanto, A., Haryanto et F., Suhartono, D.: Supervised machine learning algorithms to detect instagram fake accounts. In: 2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) , pp. 396\u2013400 (2021). https:\/\/doi.org\/10.1109\/ISRITI54043.2021.9702833","DOI":"10.1109\/ISRITI54043.2021.9702833"},{"issue":"11","key":"796_CR33","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MCOM.2018.1700575","volume":"56","author":"Q Gong","year":"2018","unstructured":"Gong, Q., et al.: DeepScan: exploiting deep learning for malicious account detection in location-based social networks. IEEE Commun. Mag. 56(11), 21\u201327 (2018). https:\/\/doi.org\/10.1109\/MCOM.2018.1700575","journal-title":"IEEE Commun. Mag."},{"key":"796_CR34","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/s40537-021-00552-5","volume":"9","author":"D Koggalahewa","year":"2022","unstructured":"Koggalahewa, D., Xu, Y., Foo, E.: An unsupervised method for social network spammer detection based on user information interests. J. Big Data 9, 7 (2022). https:\/\/doi.org\/10.1186\/s40537-021-00552-5","journal-title":"J. Big Data"},{"issue":"11","key":"796_CR35","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.1109\/TIFS.2018.2825958","volume":"13","author":"M Fazil","year":"2018","unstructured":"Fazil, M., Abulaish, M.: A hybrid approach for detecting automated spammers in twitter. IEEE Trans. Inf. Forensics Secur. 13(11), 2707\u20132719 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2825958","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"796_CR36","doi-asserted-by":"publisher","unstructured":"Ilias, L., Roussaki, I.: Detecting malicious activity in Twitter using deep learning techniques. Appl. Soft Comput. 107, 107360 (2021). https:\/\/doi.org\/10.1016\/j.asoc.2021.107360","DOI":"10.1016\/j.asoc.2021.107360"},{"key":"796_CR37","unstructured":"Mikolov, T., Chen, K., Akbari, M., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: Conference: Proceedings of the International Conference on Learning Representations (2013)"},{"key":"796_CR38","unstructured":"Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: A longterm study of content polluters on twitter. In: Fifth International AAAI Conference on Weblogs and Social Media (2011)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00796-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00796-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00796-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:43:33Z","timestamp":1711525413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00796-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,27]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["796"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00796-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,27]]},"assertion":[{"value":"27 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}