{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:55:00Z","timestamp":1766159700030,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UK-Saudi Challenge Fund 2024, British Council","award":["Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence"],"award-info":[{"award-number":["Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence"]}]},{"name":"King Abdullah University of Science and Technology (KAUST) - Center of Excellence for Generative AI","award":["5940"],"award-info":[{"award-number":["5940"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,20]]},"DOI":"10.1145\/3717867.3717894","type":"proceedings-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T21:26:58Z","timestamp":1747690018000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Early Detection of DDoS Attacks via Online Social Networks Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6222-979X","authenticated-orcid":false,"given":"Ines","family":"Abbes","sequence":"first","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8237-0539","authenticated-orcid":false,"given":"Maurantonio","family":"Caprolu","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1909-0336","authenticated-orcid":false,"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology, Thuwal, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Meshrif Alruily Abdul Manaf\u00a0Fazal Ayman\u00a0Mohamed Mostafa and Mohamed Ezz. 2023. Automated Arabic Long-Tweet Classification Using Transfer Learning with BERT. Applied Sciences 13 6 (2023). 10.3390\/app13063482","DOI":"10.3390\/app13063482"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Jeffery Ansah Lin Liu Wei Kang Jixue Liu and Jiuyong Li. 2020. Leveraging burst in twitter network communities for event detection. World Wide Web 23 (2020) 2851\u20132876.","DOI":"10.1007\/s11280-020-00786-y"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477314.3506995"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167377"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN58024.2023.10230192"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1045"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Emily Chen Ashok Deb and Emilio Ferrara. 2022. # Election2020: the first public Twitter dataset on the 2020 US Presidential election. Journal of Computational Social Science (2022) 1\u201318. 10.1007\/s42001-021-00117-9","DOI":"10.1007\/s42001-021-00117-9"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Anderson\u00a0Bergamini de Neira Burak Kantarci and Michele Nogueira. 2023. Distributed denial of service attack prediction: Challenges open issues and opportunities. Computer Networks 222 (Feb. 2023) 109553. 10.1016\/j.comnet.2022.109553","DOI":"10.1016\/j.comnet.2022.109553"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1423"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60618-31"},{"key":"e_1_3_3_2_13_2","unstructured":"Khaled\u00a0M Elleithy Drazen Blagovic Wang\u00a0K Cheng and Paul Sideleau. 2006. Denial of Service Attack Techniques: Analysis Implementation and Comparison. Journal of Systemics Cybernetics and Informatics (Jan. 2006)."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Anuradha Goswami and Ajey Kumar. 2016. A survey of event detection techniques in online social networks. Social Network Analysis and Mining 6 (2016) 1\u201325. 10.1007\/s13278-016-0414-1","DOI":"10.1007\/s13278-016-0414-1"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Qijun Gu and Peng Liu. 2007. Denial of Service Attacks. Handbook of Computer Networks: Distributed Networks Network Planning Control Management and New Trends and Applications 3 (Nov. 2007) 454\u2013468.","DOI":"10.1002\/9781118256107.ch29"},{"key":"e_1_3_3_2_16_2","unstructured":"Ehsan-Ul Haq Gareth Tyson Lik-Hang Lee Tristan Braud and Pan Hui. 2022. Twitter Dataset for 2022 Russo-Ukrainian Crisis. arxiv:https:\/\/arXiv.org\/abs\/2203.02955\u00a0[cs.SI] https:\/\/arxiv.org\/abs\/2203.02955"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.50"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Pooja Kumari and Ankit\u00a0Kumar Jain. 2023. A comprehensive study of DDoS attacks over IoT network and their countermeasures. Computers & Security 127 (April 2023) 103096. 10.1016\/j.cose.2023.103096","DOI":"10.1016\/j.cose.2023.103096"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098954"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Justin Littman and Laura Wrubel. 2019. Climate Change Tweets Ids. 10.7910\/DVN\/5QCCUU","DOI":"10.7910\/DVN\/5QCCUU"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3578503.3583610"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447535.3462498"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Z.\u00a0Morley Mao Vyas Sekar Oliver Spatscheck Jacobus van\u00a0der Merwe and Rangarajan Vasudevan. 2006. Analyzing large DDoS attacks using multiple data sources(LSAD \u201906). Association for Computing Machinery New York NY USA 161\u2013168. 10.1145\/1162666.1162675","DOI":"10.1145\/1162666.1162675"},{"key":"e_1_3_3_2_24_2","volume-title":"3rd Workshop on Online Social Networks","author":"Motoyama Marti","year":"2010","unstructured":"Marti Motoyama, Brendan Meeder, Kirill Levchenko, Geoffrey\u00a0M. Voelker, and Stefan Savage. 2010. Measuring Online Service Availability Using Twitter. In 3rd Workshop on Online Social Networks. USENIX Association, Boston, MA, USA."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"Mohammad Najafimehr Sajjad Zarifzadeh and Seyedakbar Mostafavi. 2023. DDoS attacks and machine-learning-based detection methods: A survey and taxonomy. Engineering Reports (May 2023) e12697. 10.1002\/eng2.12697","DOI":"10.1002\/eng2.12697"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3578503.3583597"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3605098.3635919"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Vin\u00edcius De\u00a0Miranda Rios Pedro R.\u00a0M. In\u00e1cio Damien Magoni and M\u00e1rio\u00a0M. Freire. 2022. Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey. IEEE Access 10 (2022) 76648\u201376668. 10.1109\/ACCESS.2022.3191430","DOI":"10.1109\/ACCESS.2022.3191430"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339704"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741083"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.94"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"Thomas Wolf Lysandre Debut Victor Sanh Julien Chaumond Clement Delangue Anthony Moi Pierric Cistac Tim Rault R\u00e9mi Louf Morgan Funtowicz et\u00a0al. 2019. HuggingFace\u2019s Transformers: State-of-the-art Natural Language Processing. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1910.03771 (Oct. 2019).","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Saman\u00a0Taghavi Zargar James Joshi and David Tipper. 2013. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys & Tutorials 15 4 (2013) 2046\u20132069. 10.1109\/SURV.2013.031413.00127","DOI":"10.1109\/SURV.2013.031413.00127"}],"event":{"name":"Websci '25: 17th ACM Web Science Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"New Brunswick NJ USA","acronym":"Websci '25"},"container-title":["Proceedings of the 17th ACM Web Science Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717867.3717894","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3717867.3717894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:40Z","timestamp":1750298260000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717867.3717894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":32,"alternative-id":["10.1145\/3717867.3717894","10.1145\/3717867"],"URL":"https:\/\/doi.org\/10.1145\/3717867.3717894","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]},"assertion":[{"value":"2025-05-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}