Detecting Suspicious Activities of Digital Trolls During the Political Crisis.
Shaaban A. SahmoudHayder SafiPublished in: ICIoT (2020)
Keyphrases
- malicious activities
- identity theft
- intrusion detection system
- online social networks
- automatic detection
- social media
- e government
- human activities
- anomaly detection
- insider threat
- activity recognition
- data mining
- database
- information technology
- three dimensional
- neural network
- detecting malicious
- intrusion detection
- information systems
- databases