The Underground on 140 Characters or Less ∗
暂无分享,去创建一个
[1] Susan T. Dumais,et al. A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.
[2] A. Hobday,et al. Trust and Safety , 2004 .
[3] Stefan Savage,et al. Spamscatter: Characterizing Internet Scam Hosting Infrastructure , 2007, USENIX Security Symposium.
[4] Hao Chen,et al. Spam double-funnel: connecting web spammers with advertisers , 2007, WWW '07.
[5] Geoff Hulten,et al. Spamming botnets: signatures and characteristics , 2008, SIGCOMM '08.
[6] Chris Kanich,et al. Spamalytics: an empirical analysis of spam marketing conversion , 2008, CCS.
[7] Arvind Krishnamurthy,et al. Studying Spamming Botnets Using Botlab , 2009, NSDI.
[8] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[9] Calton Pu,et al. Study of Static Classification of Social Spam Profiles in MySpace , 2010, ICWSM.
[10] David M. Nicol,et al. The Koobface botnet and the rise of social malware , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[11] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[12] Fang Yu,et al. On Network-level Clusters for Spam Detection , 2010, NDSS.
[13] Patrick Gage Kelley,et al. IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network , 2010 .
[14] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[15] Chris Kanich,et al. Botnet Judo: Fighting Spam with Itself , 2010, NDSS.