-
1
-
-
85170011002
-
-
Accessed: Dec. 20, 2009
-
Amazon comes to twitter. http://www.readwriteweb.com/archives/amazon- comes-to-twitter.php [Accessed: Dec. 20, 2009].
-
Amazon Comes to Twitter
-
-
-
4
-
-
85170007010
-
-
Accessed: Sept. 12, 2009
-
The crm114 discriminator. http://crm114.sourceforge.net/ [Accessed: Sept. 12, 2009].
-
The Crm114 Discriminator
-
-
-
6
-
-
42149149254
-
I tube, you tube, everybody tubes: Analyzing the world's largest user generated content video system
-
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, and Sue Moon. I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, San Diego, CA, USA, 2007.
-
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, San Diego, CA, USA, 2007
-
-
Cha, M.1
Kwak, H.2
Rodriguez, P.3
Ahn, Y.-Y.4
Moon, S.5
-
7
-
-
84865652746
-
A measurement-driven analysis of information propagation in the flickr social network
-
Meeyoung Cha, Alan Mislove, and Krishna P. Gummadi. A measurement-driven analysis of information propagation in the flickr social network. In Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain, 2009.
-
Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain, 2009
-
-
Cha, M.1
Mislove, A.2
Gummadi, K.P.3
-
9
-
-
42149131458
-
Characterizing residential broadband networks
-
Marcel Dischinger, Andreas Haeberlen, Krishna P. Gummadi, and Stefan Saroiu. Characterizing residential broadband networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet Measurement, San Diego, CA, USA, 2007.
-
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, San Diego, CA, USA, 2007
-
-
Dischinger, M.1
Haeberlen, A.2
Gummadi, K.P.3
Saroiu, S.4
-
11
-
-
0026225958
-
Local area network traffic characteristics, with implications for broadband network congestion management
-
Henry J. Fowler and Will E. Leland. Local area network traffic characteristics, with implications for broadband network congestion management. IEEE Journal of Selected Areas in Communications, 9(7), 1991.
-
(1991)
IEEE Journal of Selected Areas in Communications
, vol.9
, Issue.7
-
-
Fowler, H.J.1
Leland, W.E.2
-
12
-
-
77952331178
-
Detecting covert timing channels: An entropy-based approach
-
Steven Gianvecchio and Haining Wang. Detecting covert timing channels: An entropy-based approach. In Proceedings of the 2007 ACM Conference on Computer and Communications Security, Alexandria, VA, USA, October-November 2007.
-
Proceedings of the 2007 ACM Conference on Computer and Communications Security, Alexandria, VA, USA, October-November 2007
-
-
Gianvecchio, S.1
Wang, H.2
-
13
-
-
74049146069
-
Battle of botcraft: Fighting bots in online games with human observational proofs
-
Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, and Haining Wang. Battle of botcraft: fighting bots in online games with human observational proofs. In Proceedings of the 16th ACM conference on Computer and Communications Security, Chicago, IL, USA, 2009.
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2009
-
-
Gianvecchio, S.1
Wu, Z.2
Xie, M.3
Wang, H.4
-
14
-
-
78751511305
-
Measurement and classification of humans and bots in internet chat
-
Steven Gianvecchio, Mengjun Xie, Zhenyu Wu, and Haining Wang. Measurement and classification of humans and bots in internet chat. In Proceedings of the 17th USENIX Security symposium, San Jose, CA, 2008.
-
Proceedings of the 17th USENIX Security Symposium, San Jose, CA, 2008
-
-
Gianvecchio, S.1
Xie, M.2
Wu, Z.3
Wang, H.4
-
15
-
-
77953303843
-
Walking in facebook: A case study of unbiased sampling of osns
-
Minas Gjoka, Maciej Kurant, Carter T Butts, and Athina Markopoulou. Walking in facebook: A case study of unbiased sampling of osns. In Proceedings of the 27th IEEE International Conference on Computer Communications, San Diego, CA, USA, March 2010.
-
Proceedings of the 27th IEEE International Conference on Computer Communications, San Diego, CA, USA, March 2010
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.T.3
Markopoulou, A.4
-
16
-
-
84874905168
-
-
Accessed: Feb. 5, 2010
-
Google. Google safe browsing API. http://code.google.com/apis/ safebrowsing/[Accessed: Feb. 5, 2010].
-
Google Safe Browsing API
-
-
-
17
-
-
3242783893
-
-
Accessed: Jan. 25, 2008
-
Paul Graham. A plan for spam, 2002. http://www.paulgraham.com/spam.html [Accessed: Jan. 25, 2008].
-
(2002)
A Plan for Spam
-
-
Graham, P.1
-
18
-
-
85170002982
-
On near-uniform url sampling
-
Monika R. Henzinger, Allan Heydon, Michael Mitzenmacher, and Marc Najork. On near-uniform url sampling. In Proceedings of the 9th International World Wide Web Conference on Computer Networks, Amsterdam, The Netherlands, May 2000.
-
Proceedings of the 9th International World Wide Web Conference on Computer Networks, Amsterdam, the Netherlands, May 2000
-
-
Henzinger Allan Heydon, M.R.1
Mitzenmacher, M.2
Najork, M.3
-
20
-
-
85016567947
-
Complexity and adaptation
-
B A Huberman and T Hogg. Complexity and adaptation. Phys. D, 2(1-3), 1986.
-
(1986)
Phys. D
, vol.2
, Issue.1-3
-
-
Huberman, B.A.1
Hogg, T.2
-
22
-
-
51949088231
-
Traffic shaping of spam botnets
-
H. Husna, S. Phithakkitnukoon, and R. Dantu. Traffic shaping of spam botnets. In Proceedings of the 5th IEEE Conference on Consumer Communications and Networking, Las Vegas, NV, USA, January 2008.
-
Proceedings of the 5th IEEE Conference on Consumer Communications and Networking, Las Vegas, NV, USA, January 2008
-
-
Husna, H.1
Phithakkitnukoon, S.2
Dantu, R.3
-
23
-
-
70349929576
-
Twitter power: Tweets as electronic word of mouth
-
Bernard J. Jansen, Mimi Zhang, Kate Sobel, and Abdur Chowdury. Twitter power: Tweets as electronic word of mouth. American Society for Information Science and Technology, 60(11), 2009.
-
(2009)
American Society for Information Science and Technology
, vol.60
, Issue.11
-
-
Jansen, B.J.1
Zhang, M.2
Sobel, K.3
Chowdury, A.4
-
24
-
-
43449135033
-
Why we twitter: Understanding microblogging usage and communities
-
Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. Why we twitter: understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, San Jose, CA, USA, 2007.
-
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, San Jose, CA, USA, 2007
-
-
Java, A.1
Song, X.2
Finin, T.3
Tseng, B.4
-
25
-
-
68249151045
-
A few chirps about twitter
-
Balachander Krishnamurthy, Phillipa Gill, and Martin Arlitt. A few chirps about twitter. In Proceedings of the First Workshop on Online Social Networks, Seattle, WA, USA, 2008.
-
Proceedings of the First Workshop on Online Social Networks, Seattle, WA, USA, 2008
-
-
Krishnamurthy, B.1
Gill, P.2
Arlitt, M.3
-
27
-
-
42149117427
-
Measurement and analysis of online social networks
-
Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, and Bobby Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, San Diego, CA, USA, 2007.
-
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, San Diego, CA, USA, 2007
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
28
-
-
0031611375
-
Measuring regularity by means of a corrected conditional entropy in sympathetic outflow
-
January
-
A Porta, G Baselli, D Liberati, N Montano, C Cogliati, T Gnecchi-Ruscone, A Malliani, and S Cerutti. Measuring regularity by means of a corrected conditional entropy in sympathetic outflow. Biological Cybernetics, Vol. 78(No. 1), January 1998.
-
(1998)
Biological Cybernetics
, vol.78
, Issue.1
-
-
Porta, A.1
Baselli, G.2
Liberati, D.3
Montano, N.4
Cogliati, C.5
Gnecchi-Ruscone, T.6
Malliani, A.7
Cerutti, S.8
-
31
-
-
0002442796
-
Machine learning in automated text categorization
-
Fabrizio Sebastiani. Machine learning in automated text categorization. ACM Computing Surveys, Vol. 34(No. 1), 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.1
-
-
Sebastiani, F.1
-
34
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proceedings of the 16th ACM conference on Computer and Communications Security, Chicago, IL, USA, 2009.
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 2009
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
35
-
-
84905594974
-
Back-channels on the front lines: Emerging use of social media in the 2007 southern california wildfires
-
J. Sutton, Leysia Palen, and Irina Shlovski. Back-channels on the front lines: Emerging use of social media in the 2007 southern california wildfires. In Proceedings of the 2008 ISCRAM Conference, Washington, DC, USA, May 2008.
-
Proceedings of the 2008 ISCRAM Conference, Washington, DC, USA, May 2008
-
-
Sutton, J.1
Palen, L.2
Shlovski, I.3
-
36
-
-
0002988210
-
Computing machinery and intelligence
-
Alan M. Turing. Computing machinery and intelligence. Mind, Vol. 59:433-460, 1950.
-
(1950)
Mind
, vol.59
, pp. 433-460
-
-
Turing, A.M.1
-
37
-
-
85170006140
-
-
Accessed: Feb. 5, 2010
-
Tweetadder. Automatic twitter software. http://www.tweetadder.com/ [Accessed: Feb. 5, 2010].
-
Automatic Twitter Software
-
-
-
38
-
-
78751477245
-
-
Accessed: May. 30, 2010
-
Twitter. How to report spam on twitter. http://help.twitter.com/entries/ 64986 [Accessed: May. 30, 2010].
-
How to Report Spam on Twitter
-
-
-
39
-
-
84907053585
-
-
Accessed: Feb. 5, 2010
-
Twitter. Twitter api wiki. http://apiwiki.twitter.com/ [Accessed: Feb. 5, 2010].
-
Twitter Api Wiki
-
-
-
40
-
-
48649108112
-
Honeyim: Fast detection and suppression of instant messaging malware in enterprise-like networks
-
Mengjun Xie, Zhenyu Wu, and Haining Wang. Honeyim: Fast detection and suppression of instant messaging malware in enterprise-like networks,. In Proceedings of the 23rd Annual Computer Security Applications Conference, Miami Beach, FL, USA, 2007.
-
Proceedings of the 23rd Annual Computer Security Applications Conference, Miami Beach, FL, USA, 2007
-
-
Xie, M.1
Wu, Z.2
Wang, H.3
-
41
-
-
34547336772
-
An effective defense against email spam laundering
-
Mengjun Xie, Heng Yin, and Haining Wang. An effective defense against email spam laundering. In Proceedings of the 13th ACM conference on Computer and Communications Security, Alexandria, VA, USA, 2006.
-
Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 2006
-
-
Xie, M.1
Yin, H.2
Wang, H.3
-
43
-
-
77950275127
-
Detecting spam in a twitter network
-
January
-
Sarita Yardi, Daniel Romero, Grant Schoenebeck, and Danah Boyd. Detecting spam in a twitter network. First Monday, 15(1), January 2010.
-
(2010)
First Monday
, vol.15
, Issue.1
-
-
Yardi, S.1
Romero, D.2
Schoenebeck, G.3
Boyd, D.4
-
45
-
-
70450162300
-
How and why people twitter: The role that micro-blogging plays in informal communication at work
-
Dejin Zhao and Mary Beth Rosson. How and why people twitter: the role that micro-blogging plays in informal communication at work. In Proceedings of the ACM 2009 International Conference on Supporting Group Work, Sanibel Island, FL, USA, 2009.
-
Proceedings of the ACM 2009 International Conference on Supporting Group Work, Sanibel Island, FL, USA, 2009
-
-
Zhao, D.1
Rosson, M.B.2
|