Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
暂无分享,去创建一个
[1] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[2] Christos Faloutsos,et al. Sampling from large graphs , 2006, KDD '06.
[3] Georgia Koutrika,et al. Combating spam in tagging systems , 2007, AIRWeb '07.
[4] Phillip B. Gibbons,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2006, IEEE/ACM Transactions on Networking.
[5] Virgílio A. F. Almeida,et al. Identifying video spammers in online social networks , 2008, AIRWeb '08.
[6] Virgílio A. F. Almeida,et al. Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.
[7] Sushil Jajodia,et al. Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.
[8] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[9] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[10] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[11] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[12] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[13] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[14] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[15] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[16] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[17] Jong Kim,et al. Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.
[18] Calton Pu,et al. Reverse Social Engineering Attacks in Online Social Networks , 2011, DIMVA.
[19] Gianluca Stringhini,et al. Poultry markets: on the underground economy of twitter followers , 2012, CCRV.
[20] Guofei Gu,et al. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.
[21] Minaxi Gupta,et al. Twitter games: how successful spammers pick targets , 2012, ACSAC '12.
[22] Haining Wang,et al. Detecting Social Spam Campaigns on Twitter , 2012, ACNS.
[23] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2013, IEEE Trans. Inf. Forensics Secur..