Malicious accounts: Dark of the social networks
暂无分享,去创建一个
Nor Badrul Anuar | Kasturi Dewi Varathan | Amirrudin Kamsin | Kayode Sakariyah Adewole | N. B. Anuar | Syed Abdul Razak | A. Kamsin | K. Adewole | Syed Abdul Razak
[1] José María Gómez Hidalgo,et al. An Analysis of the Effectiveness of Personalized Spam Using Online Social Network Public Information , 2015, CISIS-ICEUTE.
[2] Leonardo Noriega,et al. Multilayer Perceptron Tutorial , 2005 .
[3] Joel J. P. C. Rodrigues,et al. Real-time data management on wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[4] Sergei Vassilvitskii,et al. k-means++: the advantages of careful seeding , 2007, SODA '07.
[5] Lada A. Adamic,et al. How to search a social network , 2005, Soc. Networks.
[6] A-L Barabási,et al. Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.
[7] Sotiris Ioannidis,et al. Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[8] Igor Santos,et al. Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying , 2015, Log. J. IGPL.
[9] David F. Nettleton,et al. Data mining of social networks represented as graphs , 2013, Comput. Sci. Rev..
[10] Hassan Takabi,et al. Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.
[11] Faisal Ahmad,et al. Analysis of Dynamic Web Services: Towards Efficient Discovery in Cloud , 2016 .
[12] Chia-Mei Chen,et al. Feature set identification for detecting suspicious URLs using Bayesian classification in social networks , 2014, Inf. Sci..
[13] Alex 'Sandy' Pentland,et al. If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts , 2016, International Journal of Information Security.
[14] David G. Schwartz,et al. Social network analysis of web links to eliminate false positives in collaborative anti-spam systems , 2011, J. Netw. Comput. Appl..
[15] Muhammad Abulaish,et al. Community-based features for identifying spammers in Online Social Networks , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[16] Alex Alves Freitas,et al. Contrasting meta-learning and hyper-heuristic research: the role of evolutionary algorithms , 2013, Genetic Programming and Evolvable Machines.
[17] Sylvio Barbon Junior,et al. Account classification in online social networks with LBCA and wavelets , 2016, Inf. Sci..
[18] Rui Zhang,et al. Least Square Transduction Support Vector Machine , 2009, Neural Processing Letters.
[19] Alex Hai Wang,et al. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.
[20] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2013, IEEE Trans. Inf. Forensics Secur..
[21] Patrick P. K. Chan,et al. Spam filtering for short messages in adversarial environment , 2015, Neurocomputing.
[22] Yi Zhang,et al. Discover millions of fake followers in Weibo , 2016, Social Network Analysis and Mining.
[23] Song Xin-fang. Survey of model and techniques for online social networks , 2013, 2013 8th International Conference on Computer Science & Education.
[24] Songqing Chen,et al. UNIK: unsupervised social network spam detection , 2013, CIKM.
[25] Rachel Friedman. Protect Your Network! Koobface Virus Targets Facebook, MySpace, Twitter Users , 2009 .
[26] Indrajit Ray,et al. SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks , 2016, SEC.
[27] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[28] Aoying Zhou,et al. Density-Based Clustering over an Evolving Data Stream with Noise , 2006, SDM.
[29] Juan Martínez-Romo,et al. Detecting malicious tweets in trending topics using a statistical analysis of language , 2013, Expert Syst. Appl..
[30] Nor Badrul Anuar,et al. The rise of "malware": Bibliometric analysis of malware study , 2016, J. Netw. Comput. Appl..
[31] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[32] M. Chuah,et al. Spam Detection on Twitter Using Traditional Classifiers , 2011, ATC.
[33] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[34] Jure Leskovec,et al. {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .
[35] Adriana Iamnitchi,et al. The power of indirect ties , 2016, Comput. Commun..
[36] Sabeur Aridhi,et al. A MapReduce-based approach for shortest path problem in large-scale networks , 2015, Eng. Appl. Artif. Intell..
[37] Francesc Sebé,et al. Endorsement deduction and ranking in social networks , 2016, Comput. Commun..
[38] David M. Nicol,et al. The Koobface botnet and the rise of social malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[39] Fangzhao Wu,et al. Co-detecting social spammers and spam messages in microblogging via exploiting social contexts , 2016, Neurocomputing.
[40] Mininath K. Nighot,et al. N-Gram Classifier System to Filter Spam Messages from OSN User Wall , 2016 .
[41] Muhammad Abulaish,et al. An MCL-Based Approach for Spam Profile Detection in Online Social Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[42] Gang Wang,et al. Serf and turf: crowdturfing for fun and profit , 2011, WWW.
[43] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[44] Krishna P. Gummadi,et al. You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.
[45] Danai Koutra,et al. Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.
[46] Peter J. Rousseeuw,et al. Finding Groups in Data: An Introduction to Cluster Analysis , 1990 .
[47] A. Kannan,et al. Detecting cloning attack in Social Networks using classification and clustering techniques , 2014, 2014 International Conference on Recent Trends in Information Technology.
[48] Ponnurangam Kumaraguru,et al. PhishAri : Automatic Realtime Phishing Detection on Twitter Anupama Aggarwal , 2012 .
[49] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[50] Wei Hu,et al. Twitter spammer detection using data stream clustering , 2014, Inf. Sci..
[51] Yong Tian,et al. Locality Preserving Based K-Means Clustering , 2015, IScIDE.
[52] Zheyi Chen,et al. Detecting spammers on social networks , 2015, Neurocomputing.
[53] AbdulMalik S. Al-Salman,et al. TSD: Detecting Sybil Accounts in Twitter , 2014, 2014 13th International Conference on Machine Learning and Applications.
[54] Bernhard Schölkopf,et al. A tutorial on support vector regression , 2004, Stat. Comput..
[55] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[56] Ciro Cattuto,et al. Social spam detection , 2009, AIRWeb '09.
[57] Lorenzo Bruzzone,et al. A novel classification technique based on progressive transductive SVM learning , 2014, Pattern Recognit. Lett..
[58] Florian Probst,et al. Online social networks: A survey of a global phenomenon , 2012 .
[59] Gianluca Stringhini,et al. Towards Detecting Compromised Accounts on Social Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[60] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[61] Anja Feldmann,et al. Understanding online social network usage from a network perspective , 2009, IMC '09.
[62] Roberto Di Pietro,et al. Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..
[63] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[64] Jong Kim,et al. Early filtering of ephemeral malicious accounts on Twitter , 2014, Comput. Commun..
[65] Guy Melançon,et al. Model for generating artificial social networks having community structures with small-world and scale-free properties , 2013, Social Network Analysis and Mining.
[66] Xiaojin Zhu,et al. Introduction to Semi-Supervised Learning , 2009, Synthesis Lectures on Artificial Intelligence and Machine Learning.
[67] Ying Liu,et al. Latent topic based multi-instance learning method for localized content-based image retrieval , 2012, Comput. Math. Appl..
[68] Yuval Elovici,et al. Homing Socialbots: Intrusion on a specific organization's employee using Socialbots , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[69] Xiao Wang,et al. VoteTrust: Leveraging friend invitation graph to defend against social network Sybils , 2013, 2013 Proceedings IEEE INFOCOM.
[70] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[71] M E J Newman,et al. Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[72] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[73] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[74] Michalis Faloutsos,et al. If walls could talk: Patterns and anomalies in Facebook wallposts , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[75] Yuval Elovici,et al. Friend or foe? Fake profile identification in online social networks , 2013, Social Network Analysis and Mining.
[76] Filippo Menczer,et al. The rise of social bots , 2014, Commun. ACM.
[77] Lada A. Adamic,et al. Friends and neighbors on the Web , 2003, Soc. Networks.
[78] Abdulrahman A. Mirza,et al. Spammer Classification Using Ensemble Methods over Structural Social Network Features , 2014, 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).
[79] Huan Liu,et al. Social Spammer Detection in Microblogging , 2013, IJCAI.
[80] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[81] Erdong Chen,et al. Facebook immune system , 2011, SNS '11.
[82] Vimala Balakrishnan,et al. Improving document relevancy using integrated language modeling techniques , 2016 .
[83] Winnie Main,et al. Twitterati Identification System , 2015 .
[84] Satu Elisa Schaeffer,et al. Graph Clustering , 2017, Encyclopedia of Machine Learning and Data Mining.
[85] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[86] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[87] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[88] Xiao Wang,et al. Detecting and Validating Sybil Groups in the Wild , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[89] Muhammad Abulaish,et al. A generic statistical approach for spam detection in Online Social Networks , 2013, Comput. Commun..
[90] Benjamin Renard,et al. Bayesian topic model approaches to online and time-dependent clustering , 2015, Digit. Signal Process..
[91] Mauro Conti,et al. FakeBook: Detecting Fake Profiles in On-Line Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[92] Md. Rafiqul Islam,et al. Evolutionary optimization: A big data perspective , 2016, J. Netw. Comput. Appl..
[93] Véronique Van Vlasselaer,et al. Using social network knowledge for detecting spider constructions in social security fraud , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[94] Hsing-Kuo Kenneth Pao,et al. Malicious URL filtering — A big data application , 2013, 2013 IEEE International Conference on Big Data.
[95] Haining Wang,et al. Detecting Social Spam Campaigns on Twitter , 2012, ACNS.
[96] Yuancheng Li,et al. A semi-supervised learning approach for detection of phishing webpages , 2013 .
[97] Sushil Jajodia,et al. Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.
[98] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[99] Monika Singh,et al. Detecting Malicious Users in Twitter using Classifiers , 2014, SIN.
[100] Jun Peng,et al. Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD) , 2014, 2014 IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing.
[101] Alexandre Varnek,et al. Transductive Support Vector Machines: Promising Approach to Model Small and Unbalanced Datasets , 2013, Molecular informatics.
[102] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[103] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[104] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[105] Krishna P. Gummadi,et al. Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.
[106] Kamalakar Karlapalem,et al. A multi-agent simulation framework on small Hadoop cluster , 2011, Eng. Appl. Artif. Intell..
[107] Ali Feizollah,et al. Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.
[108] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[109] James Caverlee,et al. Detecting Spam URLs in Social Media via Behavioral Analysis , 2015, ECIR.
[110] Virgílio A. F. Almeida,et al. Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.
[111] Hakim Hacid,et al. Towards multiple identity detection in social networks , 2012, WWW.
[112] Po-Ching Lin,et al. A study of effective features for detecting long-surviving Twitter spam accounts , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).
[113] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[114] Xiuzhen Zhang,et al. Anomaly detection in online social networks , 2014, Soc. Networks.
[115] Jian Cao,et al. Detection of Forwarding-Based Malicious URLs in Online Social Networks , 2016, International Journal of Parallel Programming.