<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Methodology for Countering Malicious Information on Social Networks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Svitlana</forename><surname>Popereshnyak</surname></persName>
							<email>spopereshnyak@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>37, Prospect Beresteiskyi</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Viktoriia</forename><surname>Zhebka</surname></persName>
							<email>viktoria.zhebka@ukr.net</email>
							<affiliation key="aff1">
								<orgName type="department">Communication Technologies</orgName>
								<orgName type="institution">State University of Information</orgName>
								<address>
									<addrLine>str. Solomyanska</addrLine>
									<postCode>03110, 7</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anastasiya</forename><surname>Vecherkovskaya</surname></persName>
							<email>vecherkovskaia90@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>24, Bohdana Gavrylyshyn Street</addrLine>
									<postCode>02000</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Methodology for Countering Malicious Information on Social Networks</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">7366961AA01393C4B5BB768D0B881014</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T18:15+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Model</term>
					<term>algorithm</term>
					<term>methodology</term>
					<term>malicious information</term>
					<term>social networks</term>
					<term>information security1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This work is devoted to an urgent problem, namely, the fight against malicious information on social networks. The goal of this work is to increase the effectiveness of countering malicious information in social networks by analyzing the sources of malicious information and automating the process of selecting countermeasures. The theoretical significance of this work lies in its contribution to the development of the theory and methodology of information security. The proposed approach allows us to determine scientifically based requirements for solving problems related to the analysis of sources of malicious information on social networks and countering both the message itself and its source. In addition, the developed models, algorithms, methods and architecture can be included in the operator's decision support system in order to combat malicious information. The proposed models, algorithms, methods and architecture, as well as their practical implementation, together provide a solution to the current scientific and technical problem of increasing the effectiveness of countering the spread of malicious information on social networks.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The deep implementation of social media in daily life is huge, and its advantage is that the participants of communication can quickly express their opinions to a large audience and share media files. Nowadays, social networks play not only the role of a means of communication, but also a tool for information dissemination. One of the obvious problems of information security in modern society is the spread of malicious information. Terrorist and criminal groups are increasingly using the means of information influence, developing strategies to expand their influence and attract new supporters through social networks. Therefore, one of the key elements of information security is to control, analyze and actively counteract malicious information in social networks. The concept of "malicious information" is considered by experts from various sciences, but no consensus has yet been reached.</p><p>Currently, the problem of combating malicious information has an insufficient number of scientific and technical solutions. The known means of detecting and counteracting malicious information in social networks do not meet the requirements for speed, completeness, accuracy and adequacy of decisions. This is due to several reasons, including the division of systems into two independent modules (Figure <ref type="figure">1</ref>): monitoring and counteraction.</p><p>In between these modules is the operator, which plays a central role. In addition, social networks have a complex structure and contain many different messages, which is often not taken into account when defining countermeasure targets, such as message type, message source and other parameters. It is important to note that huge volumes of messages need to be processed in real time and targets for countermeasures need to be identified quickly. Manually, a countermeasure operator cannot completely stop the spread of malicious information.</p><p>Figure <ref type="figure">1</ref>: System modules for detecting and countering malicious information on a social network Consequently, the main problem in combating malicious information in social networks is directly related to the current trends in the development of the information sphere, namely: <ref type="bibr" target="#b0">(1)</ref> increasing the volume of messages containing malicious information; <ref type="bibr" target="#b1">(2)</ref> increasing the speed of malicious information dissemination; (3) increasing the speed of message replication; (4) increasing the speed of new sources of information dissemination in social networks; <ref type="bibr" target="#b4">(5)</ref> increasing the number of ways to attract the attention of the audience; <ref type="bibr" target="#b5">(6)</ref> increasing the level of heterogeneity; <ref type="bibr" target="#b6">(7)</ref> increasing the number of ways to attract the audience's attention; and ( <ref type="formula" target="#formula_5">8</ref>) increasing the level of information dissemination in social networks. This requires improved effectiveness in combating malicious information on social networks, including more rapid and well-founded countermeasures.</p><p>Thus, the task that this study addresses -developing models, algorithms and methods to combat malicious information in social networks -is highly relevant.</p><p>The goal of this work is to increase the effectiveness of countering malicious information in social networks by analyzing the sources of malicious information and automating the process of selecting countermeasures.</p><p>The theoretical significance of this work lies in its contribution to the development of information security theory and methodology. The proposed approach makes it possible to define scientifically sound requirements for solving problems related to analyzing the sources of malicious information in social networks and counteracting both the message itself and its source. In addition, the developed models, algorithms, methodology and architecture can be included in the operator's decision support system to combat malicious information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>The emergence of online social networking platforms has completely transformed how students interact with information and one another. With the internet's ascent and the interactive nature of online spaces, a global phenomenon known as social networking has emerged. This encompasses a wide array of activities, ranging from the creation of virtual communities to casual conversations and blogging. A study <ref type="bibr" target="#b0">[1]</ref> explores the extensive utilization of Social Networking Sites and their influence, particularly on student. The primary objective of the research <ref type="bibr" target="#b1">[2]</ref> was to explore the dynamics of knowledge sharing within academic social networks among university students. The results of the study revealed a notable correlation between perceived personal outcome expectations, perceived social expectations, and knowledge sharing among students.</p><p>As social media usage escalates, individuals using these platforms become increasingly susceptible to their negative impacts. Detecting cyberbullying on social media platforms poses a significant challenge, particularly due to the constant evolution of slang. Nonetheless, in the paper <ref type="bibr" target="#b2">[3]</ref> proposes a practical solution-an application designed to identify cyberbullying across various social media platforms, leveraging data from Twitter and Wikipedia. The paper utilizes Deep Learning techniques to accomplish this task effectively.</p><p>In the study <ref type="bibr" target="#b3">[4]</ref>, two prevalent algorithms for network community detection were examined: Agglomerative Hierarchical Clustering and the Louvain Method. The research delved into their Operator Monitoring Opposition mechanisms, investigating and contrasting their implementation nuances and the outcomes of their clustering behavior on a standardized dataset. Advancements in technology have resulted in the accumulation of vast amounts of data from diverse sources, such as biological and social networking data. Consequently, there has been significant interest in social network analysis, given the abundance of raw datasets that can be conceptualized using a network framework. The majority of these datasets can be represented as social networks, characterized by a graph structure comprising actors and their relationships. Numerous tools have been developed for social network analysis, aimed at extracting insights from these networks. In <ref type="bibr" target="#b4">[5]</ref>, an enhanced version of NetDriller is presented, incorporating new essential features, including the construction of social networks through data collected from platforms like Twitter, IEEE, and DBLP.</p><p>As machine learning techniques increasingly intersect with real-world scenarios, the application contexts for these algorithms become progressively complex. Various domains across different fields have embraced and profited from the implementation of diverse machine learning algorithms. This complexity is particularly pronounced within the realm of social networks <ref type="bibr" target="#b5">[6]</ref>.</p><p>Unfortunately, there are limited studies that have explored the integration of convolutional neural networks for automating opinion discretization. In their paper <ref type="bibr" target="#b6">[7]</ref>, the authors introduce a novel distributed architecture aimed at addressing the challenge of opinion classification mining. With experimental results yielding high accuracy (72.99% ± 3.64), it can be inferred that implementing the authors' proposed distributed framework for opinion discretization on Facebook is indeed viable.</p><p>The study outlined in reference <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref> explores primary categories of social networks and their respective analytical methodologies. It delves into various types of connections and scrutinizes issues pertaining to ties within social networks. Additionally, it investigates and confirms the correlation between graph theory principles and the analysis of social networks.</p><p>Social networks have experienced significant success in facilitating online social interaction. However, malicious users exploit these platforms to disseminate rumors. Recent studies indicate that integrating social applications can enhance efficiency. Regrettably, new security challenges arise as malicious users exploit this integration to spread rumors across multiple social networks. In paper <ref type="bibr" target="#b9">[10]</ref>, which addresses cross propagation in multilayer social networks, the S2IR2 model is introduced to analyze the dynamics of rumor spreading.</p><p>The research <ref type="bibr" target="#b10">[11]</ref> examines several network metrics, including modularity-based algorithms for community detection and dsynamics within and between groups. Additionally, it explores network measures such as Degree centrality, betweenness centrality, closeness centrality, authority, and hub, which could correspond to essential leadership qualities such as influence, attentiveness, communication, adaptability, dissemination of information, and social adeptness.</p><p>Social network analysis proves to be a valuable tool in addressing challenges such as money laundering, identity theft, network fraud, cyberattacks, and similar issues. Numerous researchers have dedicated their efforts to investigating the dynamics of social networks <ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref>. The works <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref> is dedicated to exploring methods for detecting and combating malicious accounts and spammers within online social networks. The paper <ref type="bibr" target="#b15">[16]</ref> explores countering misinformation campaigns on social media using social network analysis, addressing challenges in identifying and attributing campaigns, tracing information flows, and understanding spheres of influence, ultimately proposing tactical approaches for mitigation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Models and algorithm for source analysis and ranking of countermeasures</head><p>Based on the conducted research, a set of functional and non-functional properties of countermeasures against malicious information in social networks and requirements for countermeasures methodology are identified.</p><p>The following properties of countering malicious information in a social network are highlighted:</p><p>• Responsiveness -the time it takes to counter malicious information on social media; • validity -a set of considered parameters for the selected objects of influence and countermeasures in the process of counteraction; • resource consumption -the probability that the amount of resources used will not exceed an acceptable value. The input and output parameters for the study were determined. Given:</p><p>DATASET ⊆ {messages, sources},</p><p>where 𝑚𝑒𝑠𝑠𝑎𝑔𝑒𝑠 -is the set of messages containing malicious information, 𝑠𝑜𝑢𝑟𝑐𝑒𝑠 -is the set of sources of these messages. MESSAGE = &lt; messageURL, source, activity, messageType &gt;, (2) where 𝑚𝑒𝑠𝑠𝑎𝑔𝑒𝑈𝑅𝐿 is the address of the post on the social network, 𝑠𝑜𝑢𝑟𝑐𝑒 is the source of the post, 𝑚𝑒𝑠𝑠𝑎𝑔𝑒𝑇𝑦𝑝𝑒 is the post type (post, comment, or reply to a comment), and 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦𝑦 is the characteristics of the post.</p><formula xml:id="formula_1">SOURCE = &lt; sourceID, sourceURL &gt;,<label>(3)</label></formula><p>where 𝑠𝑜𝑢𝑟𝑐𝑒𝐼𝐷 is the source's unique identifier, 𝑠𝑜𝑢𝑟𝑐𝑒𝑈𝑅𝐿 is the source's social media address.</p><p>ACTIVITY =&lt; countLike, countRepost, countView, countComment &gt;, (4) where 𝑐𝑜𝑢𝑛𝑡𝐿𝑖𝑘𝑒 is the number of "like" marks, 𝑐𝑜𝑢𝑛𝑡𝑅𝑒𝑝𝑜𝑠𝑡 is the number of "reposts" (copies with a link to the source), 𝑐𝑜𝑢𝑛𝑡𝑉𝑖𝑒𝑤 is the number of views, and 𝑐𝑜𝑢𝑛𝑡𝐶𝑜𝑚𝑚𝑒𝑛𝑡 is the number of comments.</p><p>Required Finding:</p><formula xml:id="formula_2">DATASET_MAX ⊆ {messages_max, sources_max},<label>(5)</label></formula><p>where 𝑚𝑒𝑠𝑠𝑎𝑔𝑒𝑠_𝑚𝑎𝑥 is the set of messages (𝑚𝑒𝑠𝑠𝑎𝑔𝑒𝑠) that will have the highest 𝑎𝑐𝑡𝑖𝑣𝑖𝑡𝑦 characteristics compared to other messages in the set 𝑚𝑒𝑠𝑠𝑎𝑔𝑒𝑠, and 𝑠𝑜𝑢𝑟𝑐𝑒𝑠_𝑚𝑎𝑥 is the set of sources (𝑠𝑜𝑢𝑟𝑐𝑒𝑠) that are associated with the maximum number of messages (𝑚𝑒𝑠𝑠𝑎𝑔𝑒𝑠) in the set 𝑚𝑒𝑠𝑠𝑎𝑔𝑒𝑠_𝑚𝑎𝑥.</p><p>The objective of the study is to develop: 1. malicious information models based on the social network model and source.; 2. a set of algorithms for analyzing sources of malicious information in social networks and ranking countermeasures. 3. techniques for countering malicious information on social media; 4. architecture and software prototypes of the components of a system for countering malicious information in social networks. The aim of the research is to improve the effectiveness of countering malicious information in social networks. In this paper, the effectiveness indicator is defined through the indicator of validity, as well as considering the requirements for efficiency and resource consumption.</p><p>Based on the models of social network and malicious information source, a theoreticalmultiple model of malicious information in a social network is developed, which includes such basic elements as:</p><p>• information object 𝐼𝑂 (from English information object), </p><p>𝑖𝑜 ∈ 𝑀𝐼𝑂𝑖 ⇔ ∃ 𝑇𝑜𝑘𝑒𝑛 𝑚𝑖𝑜 𝑖 : 𝑐ℎ𝑒𝑐𝑘𝐹𝑒𝑎𝑡𝑢𝑟𝑒 (𝑖𝑜, 𝑡) = 𝑇𝑟𝑢𝑒, where 𝐼𝑂 -is a set of information objects, 𝑖𝑜1 -is a single information object, 𝑇 -is a set of all possible attributes of an information threat, 𝑡𝑛 -is a single attribute, 𝑀𝐼𝑂 -is a set of malicious information (a set of malicious information objects), 𝑀𝐼𝑂𝑖 -is a separate class of malicious information, 𝑇𝑜𝑘𝑒𝑛 𝑚𝑖𝑜 𝑖 -a set of attributes characterizing 𝑀𝐼𝑂.</p><p>To form a set of attributes of malicious information, consider an information and attribute model that includes the following elements:</p><p>1. information threat -specified by the countermeasure system operator; 2. malicious information in the social network -specified by the countermeasure system operator by forming a set of keywords; 3. information features forming the set of all possible features. The developed set of models of social network, source and malicious information contains new classes and attributes of objects, new relations between them, and also allows to form requirements to algorithms for analyzing and evaluating sources and choosing countermeasures.</p><p>The set of algorithms for analyzing malicious information sources and ranking countermeasures (Fig. <ref type="figure">1</ref>) consists of:</p><p>1. an algorithm for ranking sources by potential, 2. of the source estimation algorithm, 3. an algorithm for sorting the objects of influence, 4. a ranking algorithm for countermeasures. The formal notation of the complex of source analysis and countermeasure ranking is as follows: </p><formula xml:id="formula_4">Z = SC → max ,<label>(7)</label></formula><p>where: 𝑆 -source, 𝐶 -countermeasure, 𝑓1(𝑆) -source potential index (𝐼 𝑝 𝑆 ) is equal to 0, 1, 2 depending on the number of messages in the analyzed dataset belonging to the source. It is calculated using the "source potential ranking algorithm". 𝑓2(𝑆)-source influence index (𝐼 𝑖 𝑆 ), whose value is between 0 and 2. The calculation of the inferentiality index follows the "source evaluation algorithm". 𝑓3(𝑆) is the priority of the source (𝐼 𝑝𝑟 𝑆 ) as an influence object in the analyzed dataset. The "impact object sorting algorithm" is applied to obtain the value. 𝑓(𝐶)ranked countermeasures based on their complexity. The ranking is done according to the countermeasure ranking algorithm.</p><p>At the output of the set of algorithms, lists of target-countermeasure pairs are generated, with the following rules for selecting objects of influence as targets (𝑡𝑎𝑟𝑔𝑒𝑡):</p><formula xml:id="formula_6">{𝑠𝑜𝑢𝑟𝑐𝑒 ∈ 𝑇𝐴𝑅𝐺𝐸𝑇 | 𝐼 𝑝𝑟 𝑠 ≅ 𝑚𝑎𝑥} , (<label>9</label></formula><formula xml:id="formula_7">) {𝑚𝑒𝑠𝑠𝑒𝑔𝑒 ∈ 𝑇𝐴𝑅𝐺𝐸𝑇 | 𝐼 𝑝𝑟 𝑠 ≅ 𝑚𝑖𝑛} , (<label>10</label></formula><formula xml:id="formula_8">)</formula><p>where 𝑇𝐴𝑅𝐺𝐸𝑇 is the set of objects of influence. The developed set of algorithms for analyzing sources of malicious information and ranking countermeasures differs from existing analogues by taking into account such attributes as source potential, user activity on the source page, and the number of views of messages with malicious information. The algorithm for ranking countermeasures differs from analogs by taking into account coefficients and complexity levels for each countermeasure. At the same time, the developed set of algorithms allows to form the requirements to the methodology of counteraction to malicious information and is the basis for the counteraction system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Methodology for countering malicious information in social networks</head><p>Let's consider the methodology of countering malicious information in a social network. The methodology for countering malicious information in a social network consists of two stages: (1) the customization stage and (2) the exploitation stage. The operation stage of the technique consists of 3 steps and is presented in Figure <ref type="figure" target="#fig_0">2</ref>. At the same time, the customization stage of the technique consists of two steps:</p><p>Step 1. "Query system customization", in which the operator defines information threats and their attributes, and the countermeasure system generates and stores lists of threats and their attributes.</p><p>Step 2. "Countermeasure ranking", in which the operator selects available implementation agents, and the system generates and saves lists of available implementation agents.</p><p>Next, the operator selects the available countermeasures, the system generates a list of countermeasures and selects the complexity coefficients of countermeasures based on expert judgment, then the system generates and saves the list of ranked countermeasures.</p><p>The outputs of the methodology are: 1. possible information threats, attributes, countermeasures and their coefficients, available agents of countermeasure realization; 2. different parameters of impact objects, according to which the operator distributes his attention and the order of decision making on countermeasures; 3. formed target-countermeasure pairs to counter malicious information in social networks through available realization agents. The developed methodology differs from the known ones by using the author's algorithms for analyzing sources and ranking countermeasures, which increases the validity of decision making about countering the target and choosing a countermeasure and reduces the operator's work time in the process of countering malicious information in the social network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Begin Selection of an information threat and its information characteristics</head><p>Starting a request to collect information</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Requesting and receiving information</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Generating the initial data set</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Component of visualization</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Shared data storage</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Collection and semantic analysis system Implementation agents</head><p>Social network</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Messages</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Sources</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Options</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Loading data from social networks</head><p>External systems</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Components of countermeasures system</head><p>Actions of the countermeasures system Actions of operator</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Data Collection Request</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Ranking and sorting of impact targets</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Source options</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Parameters of impact objects</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Analysis and sorting of impact objects</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Shared data storage</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ranking of sources by potential</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Evaluation of sources</head><p>Sorting of impact objects  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3.Counteracting a malicious operation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Component of visualization</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Databases of ranked countermeasures</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Databases of implementation agent</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Component of Countermeasures</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Shared data storage</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Component of visualization</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Component of implementation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Architecture of a system for countering malicious information in social networks</head><p>The architecture and software prototypes of the components of the anti-malware system are presented in Figure <ref type="figure" target="#fig_2">3</ref>. 1. a software prototype of a social network source analysis and evaluation component that includes a source ranking algorithm, a source evaluation algorithm, and an impact object sorting algorithm; 2. a software prototype of a countermeasure selection component that includes a countermeasure ranking algorithm, an expert judgment algorithm for generating coefficients; 3. a software prototype of the Information Threat and Countermeasure Database (DBITandC), which contains information on countermeasures against malicious information in the social network, the types of information objects to which countermeasures may be applicable, and the implementation agents through which countermeasures may be implemented.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Experiment</head><p>The experimental evaluation was carried out in several stages. First, the developed software prototypes and components were evaluated, then the operator's work time when countering malicious information without using a technique, and the operator's work time using a technique, were experimentally assessed. Resource consumption was assessed based on the data obtained in the two previous stages.</p><p>For experimental evaluation, data from the social network were collected, time measurements of the complex algorithms of source analysis and countermeasure ranking were made, CPU and RAM load indicators were obtained.</p><p>The information threat was chosen the dataset that contained to one of 19 categories: Adult English, Beer, Casino, Cigarette, Cigars, Cults, Dating, Religious, Marijuana, Occults, Prescription drugs, Racist groups, Religion, Spirits, Sport betting, Violence, Wine, Weapon, Other.</p><p>15,132 messages were collected from social networks, including posts, comments, and replies to comments. For each message, information was collected on the number of likes, comments, reposts, views, and information with the name of the source was obtained (Fig. <ref type="figure" target="#fig_4">5</ref>). The data was obtained in csv format and converted into an excel workbook. Next, the large data set was divided into 10 small sets of 1000 messages each. Each small set was analyzed and ranked using a software prototype component for analysis and evaluation of sources in social networks, the following results and characteristics were obtained (Table <ref type="table" target="#tab_2">1</ref>, Table <ref type="table" target="#tab_3">2</ref>). In the Target1 column, Source is recommended as the object of influence and shows the number of sources with high priority for counteraction, which own 334 messages out of 1000 for 1 data set, 360 messages out of 1000 for the second, etc. The Target2 column shows the number of messages that have medium priority and require additional evaluation by the operator. 118 Column Target3 recommends MessageURL as the target and shows the number of such low priority messages for each set. Thus, the sequence of the operator's work according to the results obtained is as follows (for the 1st data set): 1) the operator needs to agree on 11 objects of influence (sources) with high priority to counter them; 2) the operator needs to analyze 96 objects of influence, taking into account all characteristics (number of comments, likes, views, reposts, activity index, viewability index, potential, influence index); 3) check 570 targets last, due to their low priority for counteraction. An experimental evaluation of a set of algorithms showed the efficiency of the approach to analyzing and sorting objects of influence. Next, an experimental evaluation of the countermeasure ranking algorithm was carried out. At the beginning, a list of countermeasures dependent on implementation agents was compiled. Then 10 experts were invited to participate in the experiment and were sent a voting questionnaire completed in the Google Forms service.</p><p>At the first stage of voting, experts assessed the possibility of using countermeasures to counter malicious information on social networks. Then a summary table was sent to the experts for the next vote, in which for each specified value the experts gave difficulty ratings from 1 to 10.</p><p>The following results were obtained at the output (Table <ref type="table" target="#tab_4">3</ref>, 10 lines out of 35). As a result of the experiment, countermeasures were ranked taking into account the coefficients and levels of complexity for each countermeasure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Results of experimental and theoretical evaluation of the methodology</head><p>For experimental evaluation, data from the social network were collected, time measurements of the complex algorithms of source analysis and countermeasure ranking were made, CPU and RAM load indicators were obtained. Further, research and experiments were conducted to form the initial data, it was found out that the most costly process in terms of operability is the operator work time at the stage of setting up the methodology at the 1st, 4th step at the stage of operation of the methodology. To evaluate the indicator of operator's work time to make a decision on counteraction with and without the methodology, experiments were conducted, in which 10 experts participated. According to the results of the experimental evaluation of operability, the probability of performing the technique in a given time was calculated, which is 𝑃 operability (𝑇 𝑚 ≤ 𝑇 𝑎𝑑𝑑𝑖𝑡𝑖𝑜𝑛𝑎𝑙 ) = 0,9942, which meets the requirements (𝑃 operability acceptable = 0.99) for responsiveness.</p><p>Resource consumption was assessed using a number of specific indicators typical for step 2 of the operation phase of the social network anti-malware technique. CPU load, RAM utilization, and operator work time were considered. It is shown that the resource utilization estimate meets the requirements 𝑃 res (𝑟 ≤ 𝑅 acceptable ) ≥ 𝑃 res acceptable , where 𝑃res is the probability that the resources 𝑟, spent on countering malicious information according to the methodology do not exceed the acceptable value 𝑅 acceptable = 75%, 𝑃 res acceptable is the acceptable probability value.</p><p>As part of the theoretical evaluation, the validity indicators for the developed methodology were compared with analogs, such as the solutions of Zerofox, ESET, Ithreat Cyber Group Inc. and others. It is shown that the developed methodology considers a larger number of parameters for the selected objects of influence and countermeasures in the course of countering malicious information in the social network, while meeting the requirements for other properties. Compared to analogs, the number of parameters taken into account when using the technique is larger, such that 𝑁 𝑝𝑎𝑟𝑎𝑚 </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8.">Discussions</head><p>A comparative analysis of the developed methodology with known methods in terms of the functionalities used, such as:</p><p>• A -possibility to form tasks of message collection and analysis for the monitoring system; • B -the ability to customize the available countermeasures in the system; • B-the ability to analyze the sources of messages in the resulting dataset; • D -possibility of ranking and sorting the objects of influence in the obtained dataset; • E -the ability to rank and sort the available countermeasures from the countermeasure database for each dataset; • G -the ability to select the target of influence for counteraction. The results are shown in Table <ref type="table" target="#tab_5">4</ref> (the following designations and scores are used: "+"presence of the parameter in the work (1 point); "+/-" -partial compliance with the parameter (0.5 points); "-" -absence of the parameter (0 points).</p><p>The analysis of the results of comparing the methodology for countering malicious information in social networks with analogs allows us to draw the following conclusions. First, none of the techniques, except for the proposed one, satisfies all functional requirements at the same time. Second, all techniques allow ranking countermeasures to a greater or lesser extent. Third, the parameters of messages, sources, countermeasures are considered only in the proposed methodology and in the solution from Creopoint Inc. Fourth, the lag of the closest analogs from the proposed methodology ranges from 1.5 points to 4 points. That is, the proposed method wins over the closest analogs. Thus, the results obtained in the work allow us to assert the achievement of higher efficiency of the developed methodology compared to the known ones, which proves the realization of the final goal of the study -to increase the effectiveness of countermeasures against malicious information by analyzing the sources of malicious information and automating the choice of countermeasures.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9.">Conclusions</head><p>The rise of the Internet poses a substantial risk to both personal and state data security. Consequently, the detection and mitigation of unsuitable content circulating on the worldwide web emerge as a matter of national significance.</p><p>The proposed models, algorithms, methodology and architecture, as well as their practical implementation together provide a solution to the actual scientific and technical problem of improving the effectiveness of countering the spread of malicious information in social networks. The results of the work constitute the following research outcomes:</p><p>1. A set of models of social network, source and malicious information is proposed, which differs from the existing analogs by the possibility of simultaneous consideration of the structure of information exchange in the social network, sources and malicious information.</p><p>2. A set of algorithms for analyzing malicious information sources and ranking countermeasures has been developed, which, unlike existing algorithms, takes into account connections and dependent attributes of objects in the social network, such as source potential, user activity on the page, number of message views, etc. The algorithms for ranking countermeasures take into account coefficients and complexity levels of each countermeasure. Countermeasure ranking algorithms take into account coefficients and difficulty levels for each countermeasure.</p><p>3. A methodology of countermeasures against malicious information in a social network is proposed, focused on automatic and automated selection of objects of influence and countermeasures against malicious information from a list of ranked countermeasures.</p><p>4. The architecture and program components of the system of countermeasures against malicious information are developed, which differs from existing architectures in that it supports ranking and selection of countermeasures available to the operator in the system for malicious information specified by the operator. The architecture contains original components for analyzing and evaluating the source of malicious information, a database with information on countermeasures for malicious information in social networks.</p><p>As recommendations for further development of the topic are to expand the class of algorithms for analyzing the behavior of sources and authors of messages, algorithms for analyzing the dissemination of information in a social network, integration of automatic and automated countermeasures mechanisms into existing architectures and systems.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Schematic of a set of algorithms for analyzing sources and ranking countermeasures</figDesc><graphic coords="5,86.20,332.97,422.25,361.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Formation</head><label></label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Representation of a methodology for countering malicious information at the operational stage</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Architecture of the system of counteraction to malicious information in social networks stage The architecture includes three levels: 1. management level (management component (flow and request management), visualization component (reporting)); 2. content evaluation level (source analysis and evaluation component, SQL server and database); 3. the level of countermeasure implementation (countermeasure selection component and countermeasure implementation component). Elements of the architecture are implemented as software prototypes:1. a software prototype of a social network source analysis and evaluation component that includes a source ranking algorithm, a source evaluation algorithm, and an impact object sorting algorithm; 2. a software prototype of a countermeasure selection component that includes a countermeasure ranking algorithm, an expert judgment algorithm for generating coefficients; 3. a software prototype of the Information Threat and Countermeasure Database (DBITandC), which contains information on countermeasures against malicious information in the social network, the types of information objects to which countermeasures may be applicable, and the implementation agents through which countermeasures may be implemented.</figDesc><graphic coords="8,108.85,72.00,391.33,289.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Example of experimental data set</figDesc><graphic coords="9,86.20,213.86,451.00,138.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>-</head><label></label><figDesc>is the number of considered parameters for the technique, 𝑚𝑎𝑥𝑁 𝑝𝑎𝑟𝑎𝑚 𝑆 -is the maximum number of considered parameters for analogs. At that 𝑁 𝑝𝑎𝑟𝑎𝑚 𝑀 = 12, 𝑚𝑎𝑥𝑁 𝑝𝑎𝑟𝑎𝑚 𝑆 = 8.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 1</head><label>1</label><figDesc>Results of analysis and sorting of impact objects</figDesc><table><row><cell>Data set</cell><cell>Target1 (Source)</cell><cell>Target2 (Objects for the operator)</cell><cell>Target3 (MessageURL)</cell></row><row><cell>1</cell><cell>11</cell><cell>96</cell><cell>570</cell></row><row><cell>2</cell><cell>14</cell><cell>87</cell><cell>553</cell></row><row><cell>3</cell><cell>10</cell><cell>81</cell><cell>598</cell></row><row><cell>4</cell><cell>9</cell><cell>58</cell><cell>588</cell></row><row><cell>5</cell><cell>5</cell><cell>82</cell><cell>617</cell></row><row><cell>6</cell><cell>4</cell><cell>55</cell><cell>627</cell></row><row><cell>7</cell><cell>2</cell><cell>12</cell><cell>661</cell></row><row><cell>8</cell><cell>2</cell><cell>21</cell><cell>631</cell></row><row><cell>9</cell><cell>1</cell><cell>32</cell><cell>673</cell></row><row><cell>10</cell><cell>13</cell><cell>105</cell><cell>568</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 2</head><label>2</label><figDesc>Results of an experimental assessment of the performance characteristics of a software prototype of a component for analysis and evaluation of sources in social networks</figDesc><table><row><cell>Data set</cell><cell>Time in seconds for the algorithm</cell><cell>Additional load on the CPU</cell><cell>Additional memory load</cell></row><row><cell>1</cell><cell>42.53</cell><cell>25 %</cell><cell>512 Mb</cell></row><row><cell>2</cell><cell>40.86</cell><cell>22 %</cell><cell>512 Mb</cell></row><row><cell>3</cell><cell>41.07</cell><cell>28 %</cell><cell>128 Mb</cell></row><row><cell>4</cell><cell>41.19</cell><cell>24 %</cell><cell>300 Mb</cell></row><row><cell>5</cell><cell>41.71</cell><cell>29 %</cell><cell>100 Mb</cell></row><row><cell>6</cell><cell>41.11</cell><cell>22 %</cell><cell>128 Mb</cell></row><row><cell>7</cell><cell>40.63</cell><cell>28 %</cell><cell>212 Mb</cell></row><row><cell>8</cell><cell>40.68</cell><cell>22 %</cell><cell>300 Mb</cell></row><row><cell>9</cell><cell>42.49</cell><cell>21 %</cell><cell>410 Mb</cell></row><row><cell>10</cell><cell>41.07</cell><cell>28 %</cell><cell>512 Mb</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 3</head><label>3</label><figDesc>Result of expert assessment of countermeasures and their subsequent ranking</figDesc><table><row><cell>Countermeasure</cell><cell cols="6">Method of impact Positive Negative Neutral Auto Automated Manual Type of impact 2 1 3 1 2 3</cell><cell>Comp-lexity</cell></row><row><cell>Message Notification</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>4</cell></row><row><cell>Source Notice</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>4</cell></row><row><cell>Blocking a message in the browser</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>6</cell></row><row><cell>Blocking the source in the browser</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>6</cell></row><row><cell>Blocking a message via antivirus</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>6</cell></row><row><cell>Blocking the source via antivirus</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>6</cell></row><row><cell>Blocking a message</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>through the operating</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>6</cell></row><row><cell>system</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Blocking the source</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>through the operating</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>6</cell></row><row><cell>system</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Blocking a message via a social network</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>8</cell></row><row><cell>Blocking a source via a social network</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>8</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 4</head><label>4</label><figDesc>Comparison of the developed method with known analogues</figDesc><table><row><cell>Methodology for countering</cell><cell cols="2">Parameters</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>malicious information on social</cell><cell>А</cell><cell>B</cell><cell>С</cell><cell>D</cell><cell>E</cell><cell>F</cell><cell>Rating</cell></row><row><cell>networks</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Zerofox Inc. "Brand Protection"</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>-</cell><cell>+/-</cell><cell>+/-</cell><cell>4</cell></row><row><cell>ESET Internet Security</cell><cell>-</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>+/-</cell><cell>+/-</cell><cell>2</cell></row><row><cell>Ithreat Cyber Group Inc</cell><cell>-</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>+/-</cell><cell>-</cell><cell>1,5</cell></row><row><cell>Creopoint Inc.</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+/-</cell><cell>+/-</cell><cell>+/-</cell><cell>4,5</cell></row><row><cell>AVG Internet Security</cell><cell>+</cell><cell>+</cell><cell>-</cell><cell>-</cell><cell>+/-</cell><cell>+/-</cell><cell>3</cell></row><row><cell>Developed methodology</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>6</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Effects of Social Networking Sites on the Academic Performance of Graduate Students</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">A</forename><surname>Shanaa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">M</forename><surname>Naser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abualrish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Zaitoun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yousef</surname></persName>
		</author>
		<idno type="DOI">10.1109/SNAMS60348.2023.10375420</idno>
	</analytic>
	<monogr>
		<title level="m">Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS)</title>
				<meeting><address><addrLine>Abu Dhabi, United Arab Emirates</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Knowledge Sharing Through Academic Social Networking: The Impact of Personal and Social Outcome Expectations</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kaba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Eletter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">A E</forename><surname>Refae</surname></persName>
		</author>
		<idno type="DOI">10.1109/SNAMS60348.2023.10375418</idno>
	</analytic>
	<monogr>
		<title level="m">Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS)</title>
				<meeting><address><addrLine>Abu Dhabi, United 3Arab Emirates</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Detecting Cyberbullying Across Multiple Social Media Platforms Using Deep Learning</title>
		<author>
			<persName><forename type="first">M</forename><surname>Mahat</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICACITE51222.2021.9404736</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)</title>
				<meeting><address><addrLine>Greater Noida, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="299" to="301" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">On Comparing and Enhancing Two Common Approaches to Network Community Detection</title>
		<author>
			<persName><forename type="first">N</forename><surname>Motschnig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ramharter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Schweiger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Zabka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K. -T</forename><surname>Foerster</surname></persName>
		</author>
		<idno type="DOI">10.1109/GLOBECOM46510.2021.9685248</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE Global Communications Conference (GLOBECOM)</title>
				<meeting><address><addrLine>Madrid, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">NetDriller-V3: A Powerful Social Network Analysis Tool</title>
		<author>
			<persName><forename type="first">S</forename><surname>Afra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Özyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rokne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Alhajj</surname></persName>
		</author>
		<idno type="DOI">10.1109/ASONAM55673.2022.10068570</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</title>
				<meeting><address><addrLine>Istanbul, Turkey</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022">2022. 2022</date>
			<biblScope unit="page" from="570" to="574" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Comparative Analysis of Machine Learning Algorithms on Data Sets of Different Characteristics for Digital Transformation</title>
		<author>
			<persName><forename type="first">D</forename><surname>Oreški</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Pihir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Višnjiű</surname></persName>
		</author>
		<idno type="DOI">10.23919/MIPRO57284.2023.10159910</idno>
	</analytic>
	<monogr>
		<title level="m">2023 46th MIPRO ICT and Electronics Convention (MIPRO)</title>
				<meeting><address><addrLine>Opatija, Croatia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1428" to="1433" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Distributed Framework for Automating Opinion Discretization From Text Corpora on Facebook</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">Xuan</forename><surname>Huynh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">T</forename><surname>Nguyen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Duong-Trung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V. -H</forename><surname>Pham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">T</forename><surname>Phan</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACCESS.2019.2922427</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="78675" to="78684" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Tools and methods for intersubjective relationships in cyberspace forecasting</title>
		<author>
			<persName><forename type="first">S</forename><surname>Popereshnyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Suprun</surname></persName>
		</author>
		<idno type="DOI">10.1109/STC-CSIT.2017.8098779</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT &apos;2017</title>
				<meeting>the 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT &apos;2017<address><addrLine>Lviv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="244" to="247" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Social networks: Analysis, algorithms and their implementation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Popereshnyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Yurchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">2870</biblScope>
			<biblScope unit="page" from="811" to="821" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Rumor, Spreading with Cross Propagation in Multilayer Social Networks</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>You</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Miao</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00242</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Intl Conf on Parallel &amp; Distributed Processing with Applications, Big Data &amp; Cloud Computing, Sustainable Computing &amp; Communications, Social Computing &amp; Networking, ISPA/BDCloud/SocialCom/SustainCom &apos;2019</title>
				<meeting>the Intl Conf on Parallel &amp; Distributed Processing with Applications, Big Data &amp; Cloud Computing, Sustainable Computing &amp; Communications, Social Computing &amp; Networking, ISPA/BDCloud/SocialCom/SustainCom &apos;2019<address><addrLine>Xiamen, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1641" to="1645" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Social Network measures association with social and intelligent behaviors in Dolphin network</title>
		<author>
			<persName><forename type="first">S</forename><surname>Garg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Gandhi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Panigrahi</surname></persName>
		</author>
		<idno type="DOI">10.1109/Confluence51648.2021.9377088</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 11th International Conference on Cloud Computing, Data Science &amp; Engineering, Confluence &apos;2021</title>
				<meeting>the 11th International Conference on Cloud Computing, Data Science &amp; Engineering, Confluence &apos;2021<address><addrLine>Noida, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="655" to="659" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Strengthening Social Networks Analysis by Networks Fusion</title>
		<author>
			<persName><forename type="first">F</forename><surname>Long</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Ning</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Wu</surname></persName>
		</author>
		<idno type="DOI">10.1145/3341161.3342939</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM &apos;2019</title>
				<meeting>the ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM &apos;2019<address><addrLine>Vancouver, BC, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="460" to="463" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Social-aware Mobile Road Side Unit for Content Distribution in Vehicular Social Networks</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Bitaghsir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kashipazha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dadlani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khonsari</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISCC47284.2019.8969669</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2019 IEEE Symposium on Computers and Communications, ISCC &apos;2019</title>
				<meeting>the 2019 IEEE Symposium on Computers and Communications, ISCC &apos;2019<address><addrLine>Barcelona, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Malicious accounts: Dark of the social networks</title>
		<author>
			<persName><forename type="first">Kayode</forename><surname>Sakariyah Adewole</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nor</forename><surname>Badrul Anuar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Amirrudin</forename><surname>Kamsin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dewi</forename><surname>Kasturi</surname></persName>
		</author>
		<author>
			<persName><surname>Varathan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Abdul</forename><surname>Syed</surname></persName>
		</author>
		<author>
			<persName><surname>Razak</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jnca.2016.11.030</idno>
		<ptr target="https://doi.org/10.1016/j.jnca.2016.11.030" />
	</analytic>
	<monogr>
		<title level="j">Journal of Network and Computer Applications</title>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="41" to="67" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Detecting spammers on social networks</title>
		<author>
			<persName><forename type="first">Gianluca</forename><surname>Stringhini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christopher</forename><surname>Kruegel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Giovanni</forename><surname>Vigna</surname></persName>
		</author>
		<idno type="DOI">10.1145/1920261.1920263</idno>
		<ptr target="https://doi.org/10.1145/1920261.1920263" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC &apos;10)</title>
				<meeting>the 26th Annual Computer Security Applications Conference (ACSAC &apos;10)<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="1" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and Theory</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bargar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pitts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Butkevics</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Mcculloh</surname></persName>
		</author>
		<idno type="DOI">10.23919/CYCON.2019.8756832</idno>
	</analytic>
	<monogr>
		<title level="m">11th International Conference on Cyber Conflict (CyCon)</title>
				<meeting><address><addrLine>Tallinn, Estonia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="18" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Online social networks security and privacy: comprehensive review and analysis</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Sahoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kaubiyal</surname></persName>
		</author>
		<idno type="DOI">10.1007/s40747-021-00409-7</idno>
		<ptr target="https://doi.org/10.1007/s40747-021-00409-7" />
	</analytic>
	<monogr>
		<title level="j">Complex Intell. Syst</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="2157" to="2177" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">A new direction in social network analysis: Online social network analysis problems and applications</title>
		<author>
			<persName><forename type="first">Umit</forename><surname>Can</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bilal</forename><surname>Alatas</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.physa.2019.122372</idno>
		<ptr target="https://doi.org/10.1016/j.physa.2019.122372" />
	</analytic>
	<monogr>
		<title level="j">Physica A: Statistical Mechanics and its Applications</title>
		<imprint>
			<biblScope unit="volume">535</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
