暂无分享,去创建一个
[1] Vern Paxson,et al. Adapting Social Spam Infrastructure for Political Censorship , 2012, LEET.
[2] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[3] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[4] Dawn Xiaodong Song,et al. Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.
[5] Harold Joseph Highland,et al. Internet sniffer attacks: E. Eugene Schultz, SRI International, Menlo Park, CA and Thomas Longstaff, Carnegie Mellon University, Pittsburgh, PA, USA , 1995 .
[6] E. Rosch,et al. Categorization of Natural Objects , 1981 .
[7] Rossano Schifanella,et al. People Are Strange When You're a Stranger: Impact and Influence of Bots on Social Networks , 2012, ICWSM.
[8] M. Bishop. Vulnerabilities Analysis , 1967 .
[9] Bing Liu,et al. Opinion spam and analysis , 2008, WSDM '08.
[10] Kyumin Lee,et al. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter , 2011, ICWSM.
[11] Markus Strohmaier,et al. When Social Bots Attack: Modeling Susceptibility of Users in Online Social Networks , 2012, #MSM.
[12] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[13] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[14] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[15] Ronald D. Williams,et al. Taxonomies of attacks and vulnerabilities in computer systems , 2008, IEEE Communications Surveys & Tutorials.
[16] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[17] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).