A Framework for Spam Detection in Twitter Based on Recommendation System
暂无分享,去创建一个
[1] Jun Zhang,et al. Detecting spamming activities in twitter based on deep‐learning technique , 2017, Concurr. Comput. Pract. Exp..
[2] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[3] Danah Boyd,et al. Detecting Spam in a Twitter Network , 2009, First Monday.
[4] Komminist Weldemariam,et al. BINSPECT: Holistic Analysis and Detection of Malicious Web Pages , 2012, SecureComm.
[5] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[6] Ponnurangam Kumaraguru,et al. PhishAri : Automatic Realtime Phishing Detection on Twitter Anupama Aggarwal , 2012 .
[7] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[8] Vanyashree Mardi,et al. Text-Based Spam Tweets Detection Using Neural Networks , 2020 .
[9] R. Jašek,et al. APT detection system using honeypots , 2013 .
[10] V. Caron,et al. United states. , 2018, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[11] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[12] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[13] Igor Santos,et al. Twitter Content-Based Spam Filtering , 2013, SOCO-CISIS-ICEUTE.
[14] Habiba Chaoui,et al. Detecting Malicious Users in Social Network via Collaborative Filtering , 2017, BDCA'17.
[15] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[16] Mohammad Zulkernine,et al. EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.
[17] Christos Faloutsos,et al. Detecting suspicious following behavior in multimillion-node social networks , 2014, WWW.
[18] Younès El Bouzekri El Idrissi,et al. A security approach for social networks based on honeypots , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).
[19] Kyumin Lee,et al. The social honeypot project: protecting online communities from spammers , 2010, WWW '10.
[20] Divya,et al. Techniques to Detect Spammers in Twitter- A Survey , 2014 .
[21] Sylvio Barbon Junior,et al. Authorship verification applied to detection of compromised accounts on online social networks , 2017, Multimedia Tools and Applications.
[22] Kanliang Wang,et al. A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.
[23] Chao Yang,et al. CATS: Characterizing automation of Twitter spammers , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[24] Michalis Faloutsos,et al. Efficient and Scalable Socware Detection in Online Social Networks , 2012, USENIX Security Symposium.
[25] Calton Pu,et al. Social Honeypots: Making Friends With A Spammer Near You , 2008, CEAS.
[26] Wael Hassan Gomaa,et al. Credibility Detection in Twitter Using Word N-gram Analysis and Supervised Machine Learning Techniques , 2020, International Journal of Intelligent Engineering and Systems.
[27] Xiao Sun,et al. RETRACTED ARTICLE: Detecting anomalous emotion through big data from social networks based on a deep learning method , 2018, Multimedia Tools and Applications.
[28] Simon Fong,et al. Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.
[29] J. Prakash,et al. Detecting Malicious Posts in Social Networks Using Text Analysis , 2016 .
[30] Juan Martínez-Romo,et al. Detecting malicious tweets in trending topics using a statistical analysis of language , 2013, Expert Syst. Appl..
[31] Tshilidzi Marwala,et al. Automated Detection of Human Users in Twitter , 2015, INNS Conference on Big Data.
[32] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[33] Xingshe Zhou,et al. Autonomic and Trusted Computing , 2010, Lecture Notes in Computer Science.
[34] Ayon Chakraborty,et al. SPAM : A Framework for Social Profile Abuse Monitoring , .
[35] Wei Hu,et al. Twitter spammer detection using data stream clustering , 2014, Inf. Sci..
[36] Yi Yang,et al. Spam ain't as diverse as it seems: throttling OSN spam with templates underneath , 2014, ACSAC.
[37] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.