SocialImpact: Systematic Analysis of Underground Social Dynamics
暂无分享,去创建一个
Ziming Zhao | Gail-Joon Ahn | Hongxin Hu | Deepinder Mahi | Gail-Joon Ahn | Hongxin Hu | Ziming Zhao | D. Mahi
[1] Jennifer Jie Xu,et al. Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..
[2] Eric S. Raymond,et al. The New Hacker's Dictionary , 1991 .
[3] Hsinchun Chen,et al. US domestic extremist groups on the Web: link and content analysis , 2005, IEEE Intelligent Systems.
[4] Lise Getoor,et al. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.
[5] George W. Burruss,et al. SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD , 2010 .
[6] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[7] Franco Scarselli,et al. Inside PageRank , 2005, TOIT.
[8] Soumen Chakrabarti,et al. Dynamic personalized pagerank in entity-relation graphs , 2007, WWW '07.
[9] Claudio Gutierrez,et al. Survey of graph database models , 2008, CSUR.
[10] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[11] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[12] David M. Nicol,et al. The Koobface botnet and the rise of social malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[13] Sotiris Ioannidis,et al. Antisocial Networks: Turning a Social Network into a Botnet , 2008, ISC.
[14] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[15] H. Raiffa,et al. Decisions with Multiple Objectives , 1993 .
[16] Ken Chiang,et al. A Case Study of the Rustock Rootkit and Spam Bot , 2007, HotBots.
[17] Walter Willinger,et al. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference , 2011, IMC 2011.
[18] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[19] Ken Dunham,et al. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet , 2008 .
[20] Yong Lu,et al. Social Network Analysis of a Criminal Hacker Community , 2010, J. Comput. Inf. Syst..
[21] Dawn Xiaodong Song,et al. Inference and analysis of formal models of botnet command and control protocols , 2010, CCS '10.
[22] Philip S. Yu,et al. Identifying the influential bloggers in a community , 2008, WSDM '08.
[23] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.