Skip to content

Commit

Permalink
fix the hyperlink
Browse files Browse the repository at this point in the history
  • Loading branch information
Bhupendra Acharya committed Feb 17, 2025
1 parent 59b1793 commit c99e7bd
Showing 1 changed file with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,13 +8,13 @@ We have two main component as part of the artifacts summary. Below we provide fu
### Source Code
The first component collects data from various social platforms to identify fraudulent donation solicitations using multiple third-party services. These fraudulent social media profiles are then analyzed based on their profile metadata, such as URLs, phone numbers, and email addresses associated with fraud. The code implementation is available in the ```code/``` directory. Below, we provide key implementations with references to sections of our paper.

| Implementation | Paper Section Reference | Code Reference |
|:---------------------------------------------------:|:---------------------------:|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------:|
| Donation Keywords | Section 2.1 | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/shared_util.py#L38) |
| Data Collection | Section 2.1 | [link]https://github.com/CISPA-SysSec/scam_donation/blob/main/code/social_media_data_search.py) |
| Scam Filtration | Section 2.2 | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/raw_dataset_filter_logic.py) |
| Post/Image Clustering | Section 4, Appendix E and F | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/clustering/) |
| Scam Data Analysis Analysis | Section 5 | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/analysis.py) |
| Implementation | Paper Section Reference | Code Reference |
|:---------------------------------------------------:|:---------------------------:|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------:|
| Donation Keywords | Section 2.1 | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/shared_util.py#L38) |
| Data Collection | Section 2.1 | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/social_media_data_search.py) |
| Scam Filtration | Section 2.2 | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/raw_dataset_filter_logic.py) |
| Post/Image Clustering | Section 4, Appendix E and F | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/clustering/) |
| Scam Data Analysis Analysis | Section 5 | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/analysis.py) |
| Fraud Email, Phone Numbers, <br/> and URLs Analysis | Section 6 | [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/email_and_phone_validate.py), [link](https://github.com/CISPA-SysSec/scam_donation/blob/main/code/virus_total_api.py) |

### Data
Expand Down

0 comments on commit c99e7bd

Please sign in to comment.