<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="19619" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/19619?output=omeka-xml" accessDate="2026-04-22T05:07:53+00:00">
  <collection collectionId="16">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="51377">
                <text>Conference Papers</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="28">
    <name>Conference Paper</name>
    <description>Faculty Publications- Conference Papers</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170269">
              <text>Manta Ray Foraging Optimizer with Deep Learning based Malicious Activity Detection for Privacy Protection in Social Networks</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170270">
              <text>Machine Learning; Malicious activity detection; Manta Ray Foraging Optimization; Social Network; Twitter</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170271">
              <text>Malicious activity detection is a vital component of ensuring privacy protection in social media networks. As users engage in online interactions, protecting their sensitive information becomes paramount. Social networks can proactively identify and mitigate malicious behaviors, such as cyberbullying, data breaches, and phishing attacks by applying advanced AI and machine learning (ML) technologies. This detection system analyzes user behavior patterns, content, and network traffic to flag suspicious activities, thus safeguarding user privacy and fostering a safer online environment. The incorporation of robust malicious activity detection mechanisms helps maintain trust in social networks and reinforces the commitment to preserving user privacy in an increasingly interconnected digital landscape. This article introduces a novel Manta Ray Foraging Optimizer with Deep Learning based Malicious Activity Detection (MRFODLMAD) technique for privacy protection in social networks. The drive of the MRFODL-MAD technique is to detect and classify malicious activities in the social network. To accomplish this, the MRFODL-MAD technique preprocesses the input data. For malicious activity detection, the MRFODL-MAD technique employs long short term memory (LSTM) system. The MRFO algorithm has been executed to hyperparameter tuning process to improve the performance of the LSTM network. The experimental outcomes of the MRFODL-MAD algorithm can be tested on social networking database and the results inferred the improved performance of the MRFODL-MAD algorithm under various different measures.   2023 IEEE.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170272">
              <text>Unni M.V.; Jeevananda S.; Jacob Joseph K.; Fatma S.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="170273">
              <text>Proceedings of 2023 IEEE Technology and Engineering Management Conference - Asia Pacific, TEMSCON-ASPAC 2023</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="170274">
              <text>Institute of Electrical and Electronics Engineers Inc.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170275">
              <text>2023-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="170276">
              <text>&lt;a href="https://doi.org/10.1109/TEMSCON-ASPAC59527.2023.10531362" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1109/TEMSCON-ASPAC59527.2023.10531362&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85195139253&amp;amp;doi=10.1109%2FTEMSCON-ASPAC59527.2023.10531362&amp;amp;partnerID=40&amp;amp;md5=3982fe4f5df7b38208d340caf692abcb" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85195139253&amp;amp;doi=10.1109%2fTEMSCON-ASPAC59527.2023.10531362&amp;amp;partnerID=40&amp;amp;md5=3982fe4f5df7b38208d340caf692abcb&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170277">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="170278">
              <text>ISBN: 979-835038465-9</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170279">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170280">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="170281">
              <text>Conference paper</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="170282">
              <text>Unni M.V., Christ (Deemed to Be University), School of Business and Management, Karnataka, Bengaluru, India; Jeevananda S., Christ (Deemed to Be University), School of Business and Management, Karnataka, Bengaluru, India; Jacob Joseph K., Christ (Deemed to Be University), School of Business and Management, Karnataka, Bengaluru, India; Fatma S., Christ (Deemed to Be University), School of Business and Management, Karnataka, Bengaluru, India</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
