{"id":1259,"date":"2021-12-16T11:39:17","date_gmt":"2021-12-16T10:39:17","guid":{"rendered":"https:\/\/muenter.informatik.rwth-aachen.de\/dbis\/?p=1259"},"modified":"2022-05-16T11:04:56","modified_gmt":"2022-05-16T09:04:56","slug":"detection-of-malicious-social-bots-in-online-social-networks-using-artificial-immune-systems","status":"publish","type":"post","link":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/2021\/detection-of-malicious-social-bots-in-online-social-networks-using-artificial-immune-systems\/","title":{"rendered":"Detection of malicious social bots in online social networks using Artificial Immune Systems"},"content":{"rendered":"\n<p>Online social networks (OSNs) have become one of the main types of online applications enabling the exchange of information between a large number of users, which, however, at the same time raises new security and privacy concerns. Unexpectedly for many users, automated accounts, known as social bots, are increasingly contributing to the information distribution process. Artificial immune systems (AIS) use concepts and algorithms inspired by human immune system theory. AIS is able to adapt to the changing nature and behavior patterns of malicious social bots.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online social networks (OSNs) have become one of the main types of online applications enabling the exchange of information between a large number of users, which, however, at the same time raises new security and privacy concerns. Unexpectedly for many users, automated accounts, known as social bots, are increasingly contributing to the information distribution process. [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1259","post","type-post","status-publish","format-standard","hentry","category-thesis"],"acf":[],"_links":{"self":[{"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/posts\/1259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/comments?post=1259"}],"version-history":[{"count":4,"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/posts\/1259\/revisions"}],"predecessor-version":[{"id":2321,"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/posts\/1259\/revisions\/2321"}],"wp:attachment":[{"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/media?parent=1259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/categories?post=1259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbis.rwth-aachen.de\/dbis\/index.php\/wp-json\/wp\/v2\/tags?post=1259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}