<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Antonia Gogoglou</style></author><author><style face="normal" font="default" size="100%">Zenonas Theodosiou</style></author><author><style face="normal" font="default" size="100%">Tasos Kounoudes</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Early Malicious Activity Discovery in Microblogs by Social Bridges Detection</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">16th International Symposium on Signal Processing and Information Technology</style></publisher><pub-location><style face="normal" font="default" size="100%">Limassol, Cyprus</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the emerging and intense use of Online Social Networks (OSNs) amongst young children and teenagers (youngters), safe networking and socializing on the Web has faced extensive scrutiny. Content and interactions which are considered safe for adult OSN users, might embed potentially threatening and malicious information when it comes to underage users. This work is motivated by the strong need to safeguard youngsters OSNs experience such that they can be empowered and aware. The topology of a graph is studied towards detecting the so called social bridges, i.e. the group(s) of malicious users and their supporters, who have links and ties to both honest and malicious user communities. A graph-topology based classification scheme is proposed to detect such bridge linkages which are suspicious for threatening youngsters networking vulnerability. The proposed scheme is validated by a Twitter network, at which potentially dangerous users are identified based on their Twitter connections. The achieved performance is higher compared to previous efforts, despite the increased complexity due to the variety of groups identified as malicious.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Nick Bassiliades</style></author><author><style face="normal" font="default" size="100%">Mirjana Ivanovic</style></author><author><style face="normal" font="default" size="100%">Margita Kon-Popovska</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author><author><style face="normal" font="default" size="100%">Themis Palpanas</style></author><author><style face="normal" font="default" size="100%">Goce Trajcevski</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">New Trends in Database and Information Systems II - Selected papers of the 18th East European Conference on Advances in Databases and Information Systems and Associated Satellite Events, ADBIS 2014 Ohrid, Macedonia, September 7-10, 2014 Proceedings II</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%"> </style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-10518-5</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">312</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-10517-8</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Boualem Benatallah</style></author><author><style face="normal" font="default" size="100%">Azer Bestavros</style></author><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Armin Haller</style></author><author><style face="normal" font="default" size="100%">Yannis Manolopoulos</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Yanchun Zhang</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Web Information Systems Engineering - WISE 2014 Workshops - 15th International Workshops IWCSN 2014, Org2 2014, PCS 2014, and QUAT 2014, Thessaloniki, Greece, October 12-14, 2014, Revised Selected Papers</style></title><secondary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%"> </style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://dx.doi.org/10.1007/978-3-319-20370-6</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">9051</style></volume><isbn><style face="normal" font="default" size="100%">978-3-319-20369-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>