<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-05-04T09:02:49Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:meral.edu.mm:recid/3401" verb="GetRecord">https://meral.edu.mm/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:meral.edu.mm:recid/3401</identifier>
        <datestamp>2021-12-13T00:56:20Z</datestamp>
        <setSpec>1582963302567:1597824273898</setSpec>
        <setSpec>user-ucsy</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Detecting Social Spam Profile on Twitter</dc:title>
          <dc:creator>Swe, Myo Myo</dc:creator>
          <dc:creator>Myo, Nyein Nyein</dc:creator>
          <dc:description>The fast development of social networkingsites such as imparting, sharing, putting away andoverseeing huge data leads to pull in cybercriminals.Spammers misuse these social networking sites toabuse cyber laws for their unlawful arts. They startwith email, and then quickly spread to newadvancements, for example, texting, newsgroups andsmart phones. As online social networks, forexample, MySpace, Facebook and Twitter turned outto be progressively well known, spammers rapidlyfound another home for their spamming purposes.Spamming activities of social spammers not onlycauses dangerous for normal social network usersbut also annoys to these users. The aim of this paperis to develop social spammer detection approach withlow cost and low overhead. The detection approachis a three-phase process: (1) features extraction, (2)features selection and (3) classification. Validation ofthis approach is tested with 1KS-10KN dataset andCRESCI-2015 dataset.</dc:description>
          <dc:date>2019-02-27</dc:date>
          <dc:identifier>http://hdl.handle.net/20.500.12678/0000003401</dc:identifier>
          <dc:identifier>https://meral.edu.mm/records/3401</dc:identifier>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
