The Rise of Social Botnets: Attacks and Countermeasures
暂无分享,去创建一个
Guanhua Yan | Rui Zhang | Yanchao Zhang | Jinxue Zhang | Yanchao Zhang | Guanhua Yan | Rui Zhang | Jinxue Zhang
[1] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[2] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[3] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[4] Haining Wang,et al. Detecting Social Spam Campaigns on Twitter , 2012, ACNS.
[5] Chao Yang,et al. A taste of tweets: reverse engineering Twitter spammers , 2014, ACSAC.
[6] Vern Paxson,et al. Detecting and Analyzing Automated Activity on Twitter , 2011, PAM.
[7] Jacob Ratkiewicz,et al. Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.
[8] Niloy Ganguly,et al. Spammers' networks within online social networks: a case-study on Twitter , 2011, WWW.
[9] Michael Sirivianos,et al. Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.
[10] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[11] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[12] Guofei Gu,et al. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.
[13] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[14] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[15] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[16] Guanhua Yan,et al. On the impact of social botnets for spam distribution and digital-influence manipulation , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[17] Fabrício Benevenuto,et al. Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[18] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[19] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM 2010.
[20] Jong Kim,et al. WarningBird: Detecting Suspicious URLs in Twitter Stream , 2012, NDSS.
[21] Duncan J. Watts,et al. Everyone's an influencer: quantifying influence on twitter , 2011, WSDM '11.
[22] Hosung Park,et al. What is Twitter, a social network or a news media? , 2010, WWW '10.
[23] Alok N. Choudhary,et al. Towards Online Spam Filtering in Social Networks , 2012, NDSS.
[24] Fabrício Benevenuto,et al. You followed my bot! Transforming robots into influential users in Twitter , 2013, First Monday.
[25] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[26] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[27] Emilio Ferrara,et al. Manipulation and Abuse on Social Media , 2015, ArXiv.
[28] Hector Garcia-Molina,et al. Combating Web Spam with TrustRank , 2004, VLDB.
[29] Krishna P. Gummadi,et al. Exploring the design space of social network-based Sybil defenses , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[30] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[31] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[32] Qi He,et al. TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.
[33] Jacob Ratkiewicz,et al. Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.
[34] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .
[35] Filippo Menczer,et al. The rise of social bots , 2014, Commun. ACM.
[36] Krishna P. Gummadi,et al. Understanding and combating link farming in the twitter social network , 2012, WWW.
[37] Chi Zhang,et al. TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter , 2015, IEEE/ACM Transactions on Networking.
[38] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[39] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[40] Jong Kim,et al. Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.