暂无分享,去创建一个
[1] Guojun Wu,et al. Behavior Based Manipulation: Theory and Prosecution Evidence , 2004 .
[2] A. Khwaja,et al. Unchecked Intermediaries: Price Manipulation in an Emerging Stock Market , 2005 .
[3] Simone Raponi,et al. Time-Zone Geolocation of Crowds in the Dark Web , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[4] Jeremy Blackburn,et al. The Pushshift Reddit Dataset , 2020, ICWSM.
[5] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[6] David B. Kramer. The Way It Is and the Way It Should Be: Liability Under §10(b) of the Exchange Act and Rule 10b-5 Thereunder for Making False and Misleading Statements as Part of a Scheme to "Pump and Dump" a Stock , 2005 .
[7] W Stross. Sending a message. , 1998, Occupational health & safety.
[8] Franklin Allen,et al. Stock-Price Manipulation , 1992 .
[9] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[10] Tanja Hagemann,et al. Cryptocurrency Pump and Dump Schemes: Quantification and Detection , 2019, 2019 International Conference on Data Mining Workshops (ICDMW).
[11] Zongpeng Li,et al. Youtube traffic characterization: a view from the edge , 2007, IMC '07.
[12] Julinda Stefa,et al. Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations , 2020, 2020 29th International Conference on Computer Communications and Networks (ICCCN).
[13] Neil Gandal,et al. Price Manipulation in the Bitcoin Ecosystem , 2017 .
[14] Tālis J. Putniņš,et al. A New Wolf in Town? Pump-and-Dump Manipulation in Cryptocurrency Markets , 2020, SSRN Electronic Journal.
[15] Alex 'Sandy' Pentland,et al. An Experimental Study of Cryptocurrency Market Dynamics , 2018, CHI.
[16] Jianping Mei,et al. Market Manipulation: A Comprehensive Study of Stock Pools , 2004 .
[17] Zibin Zheng,et al. Detecting "Pump & Dump Schemes" on Cryptocurrency Market Using An Improved Apriori Algorithm , 2019, 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE).
[18] Neil Gandal,et al. An Examination of the Cryptocurrency Pump and Dump Ecosystem , 2018, Inf. Process. Manag..
[19] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[20] S. Viswanathan,et al. How to Define Illegal Price Manipulation , 2008 .
[21] J. Zittrain,et al. Spam Works: Evidence from Stock Touts and Corresponding Market Activity , 2007 .
[22] Tao Li,et al. Cryptocurrency Pump-and-Dump Schemes , 2019 .
[23] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[24] Maurizio Tesconi,et al. Charting the Landscape of Online Cryptocurrency Manipulation , 2020, IEEE Access.
[25] Benjamin Livshits,et al. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme , 2018, USENIX Security Symposium.
[26] Michael Siering,et al. All Pump, No Dump? The Impact Of Internet Deception On Stock Markets , 2013, ECIS.
[27] J. Kamps,et al. To the moon: defining and detecting cryptocurrency pump-and-dumps , 2018, Crime Science.