메뉴 건너뛰기




Volumn 6906 LNCS, Issue , 2011, Pages 175-186

Spam detection on twitter using traditional classifiers

Author keywords

machine learning; Social network security; spam detection

Indexed keywords

CONTENT-BASED FEATURES; DETECTION SCHEME; F-MEASURE; LEGITIMATE USERS; RANDOM FOREST CLASSIFIER; SOCIAL NETWORKING SITES; SOCIAL NETWORKS; SPAM DETECTION; SPAM MESSAGES; SPAMMERS; LARGE AMOUNTS;

EID: 80052767040     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23496-5_13     Document Type: Conference Paper
Times cited : (240)

References (19)
  • 2
    • 80052750559 scopus 로고    scopus 로고
    • August
    • Analytics, P.: Twitter study (August 2009), http://www.peranalytics.com/ blog/wpcontent/ uploads/2010/05/Twitter-Study-August-2009.pdf
    • (2009) Analytics, P.: Twitter Study
  • 6
    • 78649999189 scopus 로고    scopus 로고
    • Twitter. The twitter rules (2009b), http://status.twitter.com/post/ 136164828/restoringaccidentally- suspended-accounts
    • (2009) The Twitter Rules
  • 8
    • 2942731012 scopus 로고    scopus 로고
    • An extensive empirical study of feature selection metrics for text classification
    • Forman, G.: An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3, 1289-1305 (2003)
    • (2003) J. Mach. Learn. Res. , vol.3 , pp. 1289-1305
    • Forman, G.1
  • 9
    • 80052731742 scopus 로고    scopus 로고
    • Compete site comparison, http://siteanalytics.compete.com/ facebookcom+myspace.com+twi tter.com/
    • Compete Site Comparison
  • 10
    • 76549135267 scopus 로고    scopus 로고
    • Sophos facebook id probe (2008), http://www.sophos.com/pressoffice/news/ articles/2007/08/face book.html
    • (2008) Sophos Facebook Id Probe
  • 11
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identifty theft attacks on social networks
    • Bilge, L., et al.: All your contacts are belong to us: automated identifty theft attacks on social networks. In: Proceedings of ACM World Wide Web Conference (2009)
    • Proceedings of ACM World Wide Web Conference (2009)
    • Bilge, L.1
  • 12
    • 34848911641 scopus 로고    scopus 로고
    • Social Phishing
    • Jagatic, T.N., et al.: Social Phishing. Communications of ACM 50(10), 94-100 (2007)
    • (2007) Communications of ACM , vol.50 , Issue.10 , pp. 94-100
    • Jagatic, T.N.1
  • 13
    • 77950275127 scopus 로고    scopus 로고
    • Detecting Spam in a Twitter Network
    • Yardi, S., et al.: Detecting Spam in a Twitter Network. First Monday 15(1) (2010)
    • (2010) First Monday , vol.15 , Issue.1
    • Yardi, S.1
  • 16
    • 0003120218 scopus 로고    scopus 로고
    • Sequential Minimal Optimization: A fast algorithm for training support vector machines
    • Schoelkopf, B., et al. (eds.) MIT Press, Cambridge
    • Platt, J.: Sequential Minimal Optimization: A fast algorithm for training support vector machines. In: Schoelkopf, B., et al. (eds.) Advanced in Kernel Methods - Support Vector Learning. MIT Press, Cambridge
    • Advanced in Kernel Methods - Support Vector Learning
    • Platt, J.1
  • 18
    • 0025725905 scopus 로고    scopus 로고
    • Instance-based Learning Algorithms
    • Aha, D., Kibler, D.: Instance-based Learning Algorithms. Machine Learning 6, 37-66
    • Machine Learning , vol.6 , pp. 37-66
    • Aha, D.1    Kibler, D.2
  • 19
    • 0035478854 scopus 로고    scopus 로고
    • Random Forests
    • October
    • Breiman, L.: Random Forests. Machine Learning 45(1) (October 2001)
    • (2001) Machine Learning , vol.45 , Issue.1
    • Breiman, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.