Detecting Social Bots on Twitter: A Literature Review
暂无分享,去创建一个
Nazar Zaki | Hany Al Ashwal | Eiman Alothali | Elfadil A. Mohamed | Nazar Zaki | E. Mohamed | Eiman Alothali
[1] Murat Can Ganiz,et al. Preprocessing framework for Twitter bot detection , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).
[2] Qiang Fu,et al. Combating the evolving spammers in online social networks , 2018, Comput. Secur..
[3] Alex Hai Wang,et al. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.
[4] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[5] Fabio Persia,et al. Recognizing human behaviours in online social networks , 2018, Comput. Secur..
[6] Huan Liu,et al. A new approach to bot detection: Striking the balance between precision and recall , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[7] Sukomal Pal,et al. Recent developments in social spam detection and combating techniques: A survey , 2016, Inf. Process. Manag..
[8] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[9] Muhammad Abulaish,et al. A generic statistical approach for spam detection in Online Social Networks , 2013, Comput. Commun..
[10] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[11] Guanhua Yan,et al. The Rise of Social Botnets: Attacks and Countermeasures , 2016, IEEE Transactions on Dependable and Secure Computing.
[12] Filippo Menczer,et al. Online Human-Bot Interactions: Detection, Estimation, and Characterization , 2017, ICWSM.
[13] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[14] Sushil Jajodia,et al. Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.
[15] Sanjay Singh,et al. Detection of fake Twitter followers using graph centrality measures , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).
[16] Roberto Di Pietro,et al. Fame for sale: Efficient detection of fake Twitter followers , 2015, Decis. Support Syst..
[17] P. Kumaraguru,et al. $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter , 2013, 2013 APWG eCrime Researchers Summit.
[18] Xianchao Zhang,et al. Detecting Spam and Promoting Campaigns in the Twitter Social Network , 2012, 2012 IEEE 12th International Conference on Data Mining.
[19] Hossein Hamooni,et al. Temporal Patterns in Bot Activities , 2017, WWW.
[20] Filippo Menczer,et al. BotOrNot: A System to Evaluate Social Bots , 2016, WWW.
[21] Daniel Dajun Zeng,et al. Behavior enhanced deep bot detection in social media , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[22] Hossein Hamooni,et al. Identifying Correlated Bots in Twitter , 2016, SocInfo.
[23] Jong Kim,et al. Early filtering of ephemeral malicious accounts on Twitter , 2014, Comput. Commun..
[24] David W. McDonald,et al. Dissecting a Social Botnet: Growth, Content and Influence in Twitter , 2015, CSCW.
[25] AbdulMalik S. Al-Salman,et al. Twitter turing test: Identifying social machines , 2016, Inf. Sci..
[26] Özlem Aktaş,et al. Twitter fake account detection , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).
[27] Jon Crowcroft,et al. Stweeler: A Framework for Twitter Bot Analysis , 2016, WWW.
[28] S. Sivanesh,et al. Frustrate Twitter from automation: How far a user can be trusted? , 2013, 2013 International Conference on Human Computer Interactions (ICHCI).
[29] Chi Zhang,et al. TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter , 2015, IEEE/ACM Transactions on Networking.
[30] Vern Paxson,et al. Detecting and Analyzing Automated Activity on Twitter , 2011, PAM.
[31] Filippo Menczer,et al. The rise of social bots , 2014, Commun. ACM.
[32] Amos Azaria,et al. The DARPA Twitter Bot Challenge , 2016, Computer.
[33] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[34] Fabrício Benevenuto,et al. Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[35] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[36] Jong Hyuk Park,et al. Social network security: Issues, challenges, threats, and solutions , 2017, Inf. Sci..
[37] Hossein Hamooni,et al. DeBot: Twitter Bot Detection via Warped Correlation , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).
[38] Nor Badrul Anuar,et al. Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..
[39] Hamideh Afsarmanesh,et al. Phishing through social bots on Twitter , 2016, 2016 IEEE International Conference on Big Data (Big Data).
[40] Jinyuan Jia,et al. Random Walk Based Fake Account Detection in Online Social Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[41] Eugénio C. Oliveira,et al. Identifying Automatic Posting Systems in Microblogs , 2011, EPIA.
[42] Konstantin Beznosov,et al. Design and analysis of a social botnet , 2013, Comput. Networks.