-
1
-
-
81855178955
-
-
Alexa: Top sites in united states (2011), http://www.alexa.com/topsites/ countries/US
-
(2011)
Top Sites in United States
-
-
-
2
-
-
74049135779
-
-
NielsenWire: Twitter's tweet smell of success (2009), http://blog.nielsen.com/nielsenwire/online mobile/twitters-tweet-smell-of- success/
-
(2009)
Twitter's Tweet Smell of Success
-
-
-
3
-
-
84898095626
-
-
TwitterBlog: #numbers (2011), http://blog.twitter.com/2011/03/numbers. html
-
(2011)
#Numbers
-
-
-
4
-
-
84904794911
-
Social honeypots: Making friends with a spammer near you
-
Webb, S., Caverlee, J., Pu, C.: Social honeypots: Making friends with a spammer near you. In: Proceedigns of the Fifth Conference on Email and Anti-Spam, CEAS (2008)
-
Proceedigns of the Fifth Conference on Email and Anti-Spam, CEAS (2008)
-
-
Webb, S.1
Caverlee, J.2
Pu, C.3
-
5
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
ACM, New York
-
Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: Social honeypots + machine learning. In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retreival. ACM, New York (2010)
-
(2010)
Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retreival
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
6
-
-
78751502334
-
Detecting spammers on social networks
-
ACM, New York
-
Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC). ACM, New York (2010)
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC)
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
7
-
-
79251582321
-
Social spam detection
-
ACM, New York
-
Markines, B., Cattuto, C., Menczer, F.: Social spam detection. In: Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb). ACM, New York (2009)
-
(2009)
Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)
-
-
Markines, B.1
Cattuto, C.2
Menczer, F.3
-
8
-
-
77950275127
-
Detecting spam in a twitter network
-
Yardi, S., Romero, D.: Detecting spam in a twitter network. First Monday 15(1) (2010)
-
(2010)
First Monday
, vol.15
, Issue.1
-
-
Yardi, S.1
Romero, D.2
-
11
-
-
84860848688
-
Detecting spammers on twitter
-
Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Proceedings of the 7th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS (2010)
-
Proceedings of the 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS (2010)
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
12
-
-
78751493674
-
Who is tweeting on twitter: Human, bot, or cyborg?
-
Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Who is tweeting on twitter: Human, bot, or cyborg?. In: Proceedings of Annual Computer Security Applications Conference, ACSAC (2010)
-
Proceedings of Annual Computer Security Applications Conference, ACSAC (2010)
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
13
-
-
80051985554
-
Design and evaluation of a real-time url spam filtering service
-
Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: Proceedings of the IEEE Symposium on Security and Privacy (2011)
-
Proceedings of the IEEE Symposium on Security and Privacy (2011)
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
14
-
-
68549094221
-
A survey of learning-based techniques of email spam filtering
-
Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev. 29, 63-92 (2008)
-
(2008)
Artif. Intell. Rev.
, vol.29
, pp. 63-92
-
-
Blanzieri, E.1
Bryl, A.2
-
15
-
-
0009304541
-
A bayseian approach to filtering junk e-mail
-
AAAI Technical Report, AAAI Technical Report WS-98-05
-
Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayseian approach to filtering junk e-mail. In: Learning for Text Categorization: Papers from the 1998 Workshop. AAAI Technical Report, AAAI Technical Report WS-98-05 (1998)
-
(1998)
Learning for Text Categorization: Papers from the 1998 Workshop
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
16
-
-
78650005374
-
@spam: The underground on 140 characters or less
-
ACM, New York
-
Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM, New York (2010)
-
(2010)
IProceedings of the 17th ACM Conference on Computer and Communications Security
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
17
-
-
78751477245
-
-
TwitterHelpCenter: How to report spam on twitter, http://support.twitter. com/articles/64986-how-to-report-spam-on-twitter
-
How to Report Spam on Twitter
-
-
-
18
-
-
78649990172
-
-
TwitterBlog: State of twitter spam (2010), http://blog.twitter.com/2010/ 03/state-of-twitter-spam.html
-
(2010)
State of Twitter Spam
-
-
-
19
-
-
78649272122
-
-
TwitterBlog: Measuring tweets (2010), http://blog.twitter.com/2010/02/ measuring-tweets.html
-
(2010)
Measuring Tweets
-
-
-
20
-
-
35548992569
-
Sybilguard: Defending against sybil attacks via social networks
-
ACM, New York
-
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of ACM SIGCOMM Conference, SIGCOMM 2006. ACM, New York (2006)
-
(2006)
Proceedings of ACM SIGCOMM Conference, SIGCOMM 2006
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
21
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
IEEE Computer Society, Los Alamitos
-
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
22
-
-
77954619566
-
What is twitter, a social network or a news media?
-
ACM, New York
-
Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: WWW 2010: Proceedings of the 19th International Conference on World Wide Web. ACM, New York (2010)
-
(2010)
WWW 2010: Proceedings of the 19th International Conference on World Wide Web
-
-
Kwak, H.1
Lee, C.2
Park, H.3
Moon, S.4
-
25
-
-
17444429623
-
A survey of eigenvector methods for web information retrieval
-
Langville, A.N., Meyer, C.D.: A survey of eigenvector methods for web information retrieval. SIAM Review 47(1) (2005)
-
(2005)
SIAM Review
, vol.47
, Issue.1
-
-
Langville, A.N.1
Meyer, C.D.2
-
26
-
-
0000790899
-
Zur theorie der matrices
-
Perron, O.: Zur theorie der matrices. Mathematicsche Annalen 64(2) (1907)
-
(1907)
Mathematicsche Annalen
, vol.64
, Issue.2
-
-
Perron, O.1
-
27
-
-
0027557918
-
The perron-frobenius theorem and the ranking of football teams
-
Keener, J.: The perron-frobenius theorem and the ranking of football teams. SIAM Review 35(1) (1993)
-
(1993)
SIAM Review
, vol.35
, Issue.1
-
-
Keener, J.1
-
28
-
-
84863163276
-
-
TwitterAPIwiki: Rate limiting, http://dev.twitter.com/pages/rate-limiting
-
Rate Limiting
-
-
-
30
-
-
76749092270
-
The weka data mining software: An update
-
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: An update. SIGKDD Explorations 11(1) (2009), http://www.cs.waikato.ac.nz/ml/weka/
-
(2009)
SIGKDD Explorations
, vol.11
, Issue.1
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
31
-
-
34250653315
-
Detecting spam web pages through content analysis
-
ACM, New York
-
Ntoulas, A., Najork, M., Manasse, M., Fetterly, D.: Detecting spam web pages through content analysis. In: Proceedings of the 15th International Conference on World Wide Web, WWW 2006. ACM, New York (2006)
-
(2006)
Proceedings of the 15th International Conference on World Wide Web, WWW 2006
-
-
Ntoulas, A.1
Najork, M.2
Manasse, M.3
Fetterly, D.4
-
32
-
-
80051985554
-
Design and evaluation of a real-time url spam filtering service
-
Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2011)
-
Proceedings of the IEEE Symposium on Security and Privacy (May 2011)
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
33
-
-
71149108237
-
Identifying suspicious urls: An application of large-scale online learning
-
Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Identifying suspicious urls: an application of large-scale online learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, ICML 2009 (2009)
-
Proceedings of the 26th Annual International Conference on Machine Learning, ICML 2009 (2009)
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
|