Recognizing Fake identities in Online Social Networks based on a Finite Automaton approach
暂无分享,去创建一个
[1] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[2] A. Hasib. Threats of Online Social Networks , 2009 .
[3] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[4] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[5] Gang Wang,et al. Northeastern University , 2021, IEEE Pulse.
[6] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, IMC '10.
[7] Mohammad Reza Khayyambashi,et al. An approach for detecting profile cloning in online social networks , 2013, 7th International Conference on e-Commerce in Developing Countries:with focus on e-Security.
[8] D. Powers. Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation , 2008 .
[9] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[10] Christopher Krügel,et al. Abusing Social Networks for Automated User Profiling , 2010, RAID.
[11] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[12] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[13] Borko Furht,et al. Handbook of Social Network Technologies and Applications , 2010, Handbook of Social Network Technologies.
[14] Bobby Bhattacharjee,et al. Identifying Close Friends on the Internet , 2009, HotNets.
[15] Y. Elovici,et al. Strangers Intrusion Detection - Detecting Spammers and Fake Proles in Social Networks Based on Topology Anomalies , 2012 .