{"created":"2020-09-01T10:05:27.779866+00:00","id":3401,"links":{},"metadata":{"_buckets":{"deposit":"b38ad50f-b6f5-43d4-bb16-3f0f2cf68d58"},"_deposit":{"id":"3401","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3401"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3401","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Detecting Social Spam Profile on Twitter","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The fast development of social networkingsites such as imparting, sharing, putting away andoverseeing huge data leads to pull in cybercriminals.Spammers misuse these social networking sites toabuse cyber laws for their unlawful arts. They startwith email, and then quickly spread to newadvancements, for example, texting, newsgroups andsmart phones. As online social networks, forexample, MySpace, Facebook and Twitter turned outto be progressively well known, spammers rapidlyfound another home for their spamming purposes.Spamming activities of social spammers not onlycauses dangerous for normal social network usersbut also annoys to these users. The aim of this paperis to develop social spammer detection approach withlow cost and low overhead. The detection approachis a three-phase process: (1) features extraction, (2)features selection and (3) classification. Validation ofthis approach is tested with 1KS-10KN dataset andCRESCI-2015 dataset."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-22"}],"displaytype":"preview","filename":"ICCA 2019 Proceedings Book-pages-52-58.pdf","filesize":[{"value":"234 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3401/files/ICCA 2019 Proceedings Book-pages-52-58.pdf"},"version_id":"dad985ac-fd70-4d6d-95e6-faf2264ef35b"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Seventeenth International Conference on Computer Applications(ICCA 2019)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Swe, Myo Myo"},{"subitem_authors_fullname":"Myo, Nyein Nyein"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-02-27"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1156"},"item_title":"Detecting Social Spam Profile on Twitter","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-22","publish_status":"0","recid":"3401","relation_version_is_last":true,"title":["Detecting Social Spam Profile on Twitter"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:56:20.271592+00:00"}