-
1
-
-
72449133353
-
Detecting spammers and content promoters in online video social networks
-
F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonçalves. Detecting spammers and content promoters in online video social networks. In SIGIR, 2009.
-
(2009)
SIGIR
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Gonçalves, M.5
-
2
-
-
76649137380
-
Social networks and context-aware spam
-
G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders. Social networks and context-aware spam. In CSCW, 2008.
-
(2008)
CSCW
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
5
-
-
78650005374
-
@spam: The underground on 140 characters or less
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: the underground on 140 characters or less. In CCS, 2010.
-
(2010)
CCS
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
6
-
-
36348956237
-
Fighting spam on social web sites: A survey of approaches and future challenges
-
DOI 10.1109/MIC.2007.125
-
P. Heymann, G. Koutrika, and H. Garcia-Molina. Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing, 11(6):36-45, 2007. (Pubitemid 350148362)
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.6
, pp. 36-45
-
-
Heymann, P.1
Koutrika, G.2
Garcia-Molina, H.3
-
7
-
-
79955141054
-
Predicting popular messages in twitter
-
L. Hong, O. Dan, and B. D. Davison. Predicting popular messages in twitter. In WWW, 2011.
-
(2011)
WWW
-
-
Hong, L.1
Dan, O.2
Davison, B.D.3
-
8
-
-
84896777836
-
Reverse social engineering attacks in online social networks
-
D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. In Detection of intrusions and malware, and vulnerability assessment (DIMVA), 2011.
-
(2011)
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Irani, D.1
Balduzzi, M.2
Balzarotti, D.3
Kirda, E.4
Pu, C.5
-
9
-
-
84904822464
-
Study of trend-stuffing on twitter through text classification
-
D. Irani, S. Webb, C. Pu, and K. Li. Study of trend-stuffing on twitter through text classification. In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010.
-
(2010)
Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS)
-
-
Irani, D.1
Webb, S.2
Pu, C.3
Li, K.4
-
10
-
-
34848911641
-
Social phishing
-
DOI 10.1145/1290958.1290968, 1290968
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94-100, 2007. (Pubitemid 47505005)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
11
-
-
55149105065
-
Combating spam in tagging systems: An evaluation
-
G. Koutrika, F. A. Effendi, Z. Gyöngyi, P. Heymann, and H. Garcia-Molina. Combating spam in tagging systems: An evaluation. ACM Trans. Web, 2(4):1-34, 2008.
-
(2008)
ACM Trans. Web
, vol.2
, Issue.4
, pp. 1-34
-
-
Koutrika, G.1
Effendi, F.A.2
Gyöngyi, Z.3
Heymann, P.4
Garcia-Molina, H.5
-
12
-
-
83055187614
-
Content-driven detection of campaigns in social media
-
K. Lee, J. Caverlee, Z. Cheng, and D. Z. Sui. Content-driven detection of campaigns in social media. In CIKM, 2011.
-
(2011)
CIKM
-
-
Lee, K.1
Caverlee, J.2
Cheng, Z.3
Sui, D.Z.4
-
13
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
K. Lee, J. Caverlee, and S. Webb. Uncovering social spammers: Social honeypots + machine learning. In SIGIR, 2010.
-
(2010)
SIGIR
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
14
-
-
85134438433
-
Seven months with the devils: A long-term study of content polluters on twitter
-
K. Lee, B. D. Eoff, and J. Caverlee. Seven months with the devils: A long-term study of content polluters on twitter. In ICWSM, 2011.
-
(2011)
ICWSM
-
-
Lee, K.1
Eoff, B.D.2
Caverlee, J.3
-
15
-
-
84890653327
-
Information contagion: An empirical study of the spread of news on digg and twitter social networks
-
K. Lerman and R. Ghosh. Information contagion: An empirical study of the spread of news on digg and twitter social networks. In ICWSM, 2010.
-
(2010)
ICWSM
-
-
Lerman, K.1
Ghosh, R.2
-
16
-
-
78651302642
-
Detecting product review spammers using rating behaviors
-
E. P. Lim, V. A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In CIKM, 2010.
-
(2010)
CIKM
-
-
Lim, E.P.1
Nguyen, V.A.2
Jindal, N.3
Liu, B.4
Lauw, H.W.5
-
17
-
-
79955135897
-
Detecting group review spam
-
A. Mukherjee, B. Liu, J. Wang, N. Glance, and N. Jindal. Detecting group review spam. In WWW, 2011.
-
(2011)
WWW
-
-
Mukherjee, A.1
Liu, B.2
Wang, J.3
Glance, N.4
Jindal, N.5
-
18
-
-
85100558628
-
Detecting and tracking political abuse in social media
-
J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, A. Flammini, and F. Menczer. Detecting and tracking political abuse in social media. In ICWSM, 2011.
-
(2011)
ICWSM
-
-
Ratkiewicz, J.1
Conover, M.2
Meiss, M.3
Gonçalves, B.4
Flammini, A.5
Menczer, F.6
-
19
-
-
84873450362
-
Differences in the mechanics of information diffusion across topics: Idioms, political hashtags, and complex contagion on twitter
-
D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. In WWW, 2011.
-
(2011)
WWW
-
-
Romero, D.M.1
Meeder, B.2
Kleinberg, J.3
|