Towards Understanding Malicious Actions on Twitter
暂无分享,去创建一个
[1] D. Taussky,et al. Twitter , 2020, American journal of clinical oncology.
[2] Pasi Luukka,et al. A novel similarity classifier with multiple ideal vectors based on k-means clustering , 2018, Decis. Support Syst..
[3] Kristina Lerman,et al. Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign , 2018, 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[4] Abraham Seidmann,et al. When Social Media Delivers Customer Service: Differential Customer Treatment in the Airline Industry , 2018, MIS Q..
[5] Hani Safadi,et al. Social Media Affordances for Connective Action: An Examination of Microblogging Use During the Gulf of Mexico Oil Spill , 2017, MIS Q..
[6] Omer F. Rana,et al. Can We Predict a Riot? Disruptive Event Detection Using Twitter , 2017, ACM Trans. Internet Techn..
[7] Filippo Menczer,et al. Online Human-Bot Interactions: Detection, Estimation, and Characterization , 2017, ICWSM.
[8] Emilio Ferrara,et al. Social Bots Distort the 2016 US Presidential Election Online Discussion , 2016, First Monday.
[9] Filippo Menczer,et al. BotOrNot: A System to Evaluate Social Bots , 2016, WWW.
[10] Huan Liu,et al. The fragility of Twitter social networks against suspended users , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[11] Emilio Ferrara,et al. "Manipulation and abuse on social media" by Emilio Ferrara with Ching-man Au Yeung as coordinator , 2015, SIGWEB Newsl..
[12] David W. McDonald,et al. Dissecting a Social Botnet: Growth, Content and Influence in Twitter , 2015, CSCW.
[13] Michel van de Velden,et al. Online profiling and clustering of Facebook users , 2015, Decis. Support Syst..
[14] Di Jiang,et al. Integrating Social and Auxiliary Semantics for Multifaceted Topic Modeling in Twitter , 2014, TOIT.
[15] Emiliano De Cristofaro,et al. Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots , 2014, Internet Measurement Conference.
[16] V. S. Subrahmanian,et al. Using sentiment to detect bots on Twitter: Are humans more opinionated than bots? , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[17] Fabrício Benevenuto,et al. Reverse engineering socialbot infiltration strategies in Twitter , 2014, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[18] Saini Jacob Soman,et al. Detecting malicious tweets in trending topics using clustering and classification , 2014, 2014 International Conference on Recent Trends in Information Technology.
[19] Sushil Jajodia,et al. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? , 2012, IEEE Transactions on Dependable and Secure Computing.
[20] Robert Faris,et al. Mapping Russian Twitter , 2012 .
[21] Jacob Ratkiewicz,et al. Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.
[22] Hila Becker,et al. Beyond Trending Topics: Real-World Event Identification on Twitter , 2011, ICWSM.
[23] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[24] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[25] Ricardo Mendes. Troops, Trolls and Troublemakers: A Global Inventory of Organized Social Media Manipulation , 2017 .
[26] Form 8-K,et al. UNITED STATES SECURITIES AND EXCHANGE COMMISSION , 2017 .
[27] Abdolreza Abhari,et al. Cluster-discovery of Twitter messages for event detection and trending , 2015, J. Comput. Sci..
[28] Benjamin Waugh,et al. Twitter Deception and Influence: Issues of Identity, Slacktivism, and Puppetry , 2014 .
[29] Barry Wellman,et al. Geography of Twitter networks , 2012, Soc. Networks.
[30] Robert Gorwa. Computational Propaganda in Poland: False Amplifiers and the Digital Public Sphere , 2022 .