Techniques to Detect Spammers in Twitter- A Survey
暂无分享,去创建一个
[1] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[2] Po-Ching Lin,et al. A study of effective features for detecting long-surviving Twitter spam accounts , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).
[3] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[4] H. Venkateswaran,et al. A Crow or a Blackbird?: Using True Social Network and Tweeting Behavior to Detect Malicious Entities in Twitter , 2010 .
[5] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[6] Wong Fei Mun. Social Network Sites , 2014, Encyclopedia of Social Network Analysis and Mining.
[7] Virgílio A. F. Almeida,et al. Studying User Footprints in Different Online Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[8] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[9] Jong Kim,et al. Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.
[10] Jong Kim,et al. WarningBird: Detecting Suspicious URLs in Twitter Stream , 2012, NDSS.
[11] Muhammad Abulaish,et al. An MCL-Based Approach for Spam Profile Detection in Online Social Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[13] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[14] Qiang Yang,et al. Discovering Spammers in Social Networks , 2012, AAAI.
[15] Ayon Chakraborty,et al. SPAM : A Framework for Social Profile Abuse Monitoring , .
[16] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[17] Sotiris Ioannidis,et al. Detecting social network profile cloning , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[18] Aleksandar Kuzmanovic,et al. Searching for Spam: Detecting Fraudulent Accounts via Web Search , 2013, PAM.
[19] Mauro Conti,et al. FakeBook: Detecting Fake Profiles in On-Line Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[20] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[21] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[22] M. Chuah,et al. Spam Detection on Twitter Using Traditional Classifiers , 2011, ATC.
[23] G. Gee,et al. Twitter Spammer Profile Detection , 2010 .
[24] Chao Yang,et al. CATS: Characterizing automation of Twitter spammers , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).
[25] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[26] Virgílio A. F. Almeida,et al. Detecting Spammers on Twitter , 2010 .