{"id":"https://openalex.org/W3005103432","doi":"https://doi.org/10.1049/iet-ifs.2018.5286","title":"Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process","display_name":"Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process","publication_year":2020,"publication_date":"2020-02-03","ids":{"openalex":"https://openalex.org/W3005103432","doi":"https://doi.org/10.1049/iet-ifs.2018.5286","mag":"3005103432"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs.2018.5286","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100706835","display_name":"Xiujuan Wang","orcid":"https://orcid.org/0000-0003-1520-9053"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiujuan Wang","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, No. 100, Pingleyuan, Chaoyang District, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, No. 100, Pingleyuan, Chaoyang District, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072753391","display_name":"Haoyang Tang","orcid":"https://orcid.org/0000-0001-5078-5668"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoyang Tang","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, No. 100, Pingleyuan, Chaoyang District, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, No. 100, Pingleyuan, Chaoyang District, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I37796252"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101644259","display_name":"Kangfeng Zheng","orcid":"https://orcid.org/0000-0001-8405-1726"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kangfeng Zheng","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, No. 10, Xitucheng Road, Haidian District, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, No. 10, Xitucheng Road, Haidian District, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067778440","display_name":"Yuanrui Tao","orcid":"https://orcid.org/0000-0003-3210-5256"},"institutions":[{"id":"https://openalex.org/I37796252","display_name":"Beijing University of Technology","ror":"https://ror.org/037b1pp87","country_code":"CN","type":"education","lineage":["https://openalex.org/I37796252"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanrui Tao","raw_affiliation_strings":["Faculty of Information Technology, Beijing University of Technology, No. 100, Pingleyuan, Chaoyang District, Beijing, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Beijing University of Technology, No. 100, Pingleyuan, Chaoyang District, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I37796252"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072753391"],"corresponding_institution_ids":["https://openalex.org/I37796252"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200,"provenance":"doaj"},"apc_paid":null,"fwci":2.313,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.813852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"14","issue":"4","first_page":"401","last_page":"409"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Detection and Prevention of Phishing Attacks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.551911},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.533289},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.532691},{"id":"https://openalex.org/keywords/social-hierarchy","display_name":"Social hierarchy","score":0.51897067},{"id":"https://openalex.org/keywords/spam-detection","display_name":"Spam Detection","score":0.517799},{"id":"https://openalex.org/keywords/behavioral-analysis","display_name":"Behavioral Analysis","score":0.514272},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.511542}],"concepts":[{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.757589},{"id":"https://openalex.org/C87345402","wikidata":"https://www.wikidata.org/wiki/Q485202","display_name":"Analytic hierarchy process","level":2,"score":0.7452676},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7070767},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6034221},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.54634815},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.533289},{"id":"https://openalex.org/C2994053276","wikidata":"https://www.wikidata.org/wiki/Q841628","display_name":"Social hierarchy","level":2,"score":0.51897067},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.50661314},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4984355},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.13544983},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.114786595},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.06802067},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs.2018.5286","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.7}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61602052"}],"datasets":[],"versions":[],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1233141674","https://openalex.org/W1573258035","https://openalex.org/W1672660286","https://openalex.org/W1892874464","https://openalex.org/W1986678144","https://openalex.org/W1994940238","https://openalex.org/W1996802155","https://openalex.org/W2000908731","https://openalex.org/W2005002286","https://openalex.org/W2028475679","https://openalex.org/W2041316488","https://openalex.org/W2041709326","https://openalex.org/W2072715695","https://openalex.org/W2087690152","https://openalex.org/W2098952980","https://openalex.org/W2103040070","https://openalex.org/W2107541186","https://openalex.org/W2128406786","https://openalex.org/W2130905138","https://openalex.org/W2155154949","https://openalex.org/W2165701072","https://openalex.org/W2253230091","https://openalex.org/W2397135192","https://openalex.org/W2403863121","https://openalex.org/W2595521492","https://openalex.org/W2605369382","https://openalex.org/W2621067525","https://openalex.org/W2764128407","https://openalex.org/W2898395483","https://openalex.org/W2898610665"],"related_works":["https://openalex.org/W4306674287","https://openalex.org/W4306321456","https://openalex.org/W4286629047","https://openalex.org/W4254721795","https://openalex.org/W4224009465","https://openalex.org/W3042169044","https://openalex.org/W2961085424","https://openalex.org/W2387193617","https://openalex.org/W2002322891","https://openalex.org/W1977057238"],"abstract_inverted_index":{"In":[0,33],"recent":[1],"years,":[2],"the":[3,28,36,57,65,77,84,91,117,122,133,138],"security":[4,29],"of":[5,14,30,42,60,68,93,121],"online":[6],"social":[7,146],"networks":[8],"(OSNs)":[9],"has":[10],"become":[11],"an":[12],"issue":[13],"widespread":[15],"concern.":[16],"Searching":[17],"and":[18,102,119,126],"detecting":[19,43,150],"compromised":[20,44,143,151],"accounts":[21,45,144],"in":[22],"OSNs":[23],"is":[24],"crucial":[25],"for":[26,149],"ensuring":[27],"OSN":[31],"platforms.":[32],"this":[34],"study,":[35],"authors":[37],"proposed":[38],"a":[39,48,61,69,97],"new":[40,134],"method":[41,135],"based":[46],"on":[47,145],"supervised":[49],"analytical":[50,85],"hierarchy":[51,86],"process":[52,87],"(SAHP).":[53],"First,":[54],"they":[55],"considered":[56],"expression":[58],"habits":[59],"user":[62,70],"to":[63,89,107],"present":[64],"profile":[66],"features":[67],"more":[71],"comprehensively":[72],"than":[73],"previous":[74],"research.":[75],"Next,":[76],"information":[78],"gain":[79],"ratio":[80],"was":[81,100],"combined":[82],"with":[83],"algorithm":[88],"calculate":[90],"weight":[92],"each":[94],"feature.":[95],"Finally,":[96],"detection":[98,110],"decision":[99],"taken,":[101],"varying":[103],"thresholds":[104],"were":[105,124],"used":[106],"obtain":[108],"different":[109],"results.":[111],"The":[112,129],"experimental":[113],"results":[114,130],"showed":[115],"that":[116,132],"accuracy":[118],"precision":[120],"SAHP":[123],"81.7":[125],"96.4%,":[127],"respectively.":[128],"indicated":[131],"improved":[136],"upon":[137],"previously":[139],"established":[140],"COMPA":[141],"(detecting":[142],"networks)":[147],"methods":[148],"accounts.":[152]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3005103432","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":1}],"updated_date":"2024-10-01T15:26:51.762878","created_date":"2020-02-14"}