Information Technology Reference
In-Depth Information
7. Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F.,
Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the
twitter social network. In: Proceedings of International Conference on World Wide
Web, pp. 61-70 (2012)
8. Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Detecting suspicious follow-
ing behavior in multimillion-node social networks. In: Proceedings of the Compan-
ion Publication of the International Conference on World Wide Web Companion,
pp. 305-306 (2014)
9. Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a
news media? In: Proceedings of International Conference on World Wide Web,
pp. 591-600 (2010)
10. Lee, S., Kim, J.: Warningbird: A near real-time detection system for suspicious urls
in twitter stream. IEEE Transactions on Dependable and Secure Computing 10(3),
183-195 (2013)
11. Netowrkx: Netowrkx, https://networkx.github.io/
12. Nexgate: 2013 state of social media spam,
http://nexgate.com/wp-content/uploads/2013/09/Nexgate-2013-State-of-
Social-Media-Spam-Research-Report.pdf
13. Peng, H.K., Zhu, J., Piao, D., Yan, R., Zhang, Y.: Retweet modeling using con-
ditional random fields. In: Proceedings of IEEE International Conference on Data
Mining Workshops, pp. 336-343 (2011)
14. Shekar, C., Wakade, S., Liszka, K.J., Chan, C.C.: Mining pharmaceutical spam
from twitter. In: Proceedings of International Conference on Intelligent Systems
Design and Applications, pp. 813-817 (2010)
15. Song, J., Lee, S., Kim, J.: Spam filtering in twitter using sender-receiver relation-
ship. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961,
pp. 301-317. Springer, Heidelberg (2011)
16. Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In:
Proceedings of Annual Computer Security Applications Conference, pp. 1-9 (2010)
17. Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y.:
Follow the green: growth and dynamics in twitter follower markets. In: Proceedings
of ACM SIGCOMM Conference on Internet Measurement, pp. 163-176 (2013)
18. Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a
real-time url spam filtering service. In: Proceedings of IEEE Symposium on Security
and Privacy, pp. 447-462 (2011)
19. Twitter: About verified accounts,
https://support.twitter.com/articles/119135
20. Twitter: Rest api v1.1 resources, https://dev.twitter.com/docs/api/1.1
21. Twitter: Twitter limits (api, updates, and following),
https://support.twitter.com/articles/15364
22. Watts, D.J., Strogatz, S.H.: Collective dynamics of 'small-world' networks. Nature
393(6684), 440-442 (1998)
23. Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical machine learning tools
and techniques, 3rd edn. Morgan Kaufmann (2011)
24. Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers' social
networks for fun and profit: a case study of cyber criminal ecosystem on twitter.
In: Proceedings of International Conference on World Wide Web, pp. 71-80 (2012)
25. Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and
new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D.,
Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318-337. Springer, Heidelberg
(2011)
Search WWH ::




Custom Search