-
4
-
-
84866598244
-
-
Dec.
-
"Amazon Comes to Twitter," http://www.readwriteweb.com/ archives/amazon-comes-to-twitter.php, Dec. 2009.
-
(2009)
-
-
-
7
-
-
84905594974
-
Back-channels on the front lines: Emerging use of social media in the 2007 southern California wildfires
-
May
-
J. Sutton, L. Palen, and I. Shlovski, "Back-Channels on the Front Lines: Emerging Use of Social Media in the 2007 Southern California Wildfires," Proc. Int'l ISCRAM Conf., May 2008.
-
(2008)
Proc. Int'l ISCRAM Conf.
-
-
Sutton, J.1
Palen, L.2
Shlovski, I.3
-
8
-
-
84905567213
-
Twitter adoption and use in mass convergence and emergency events
-
May
-
A.L. Hughes and L. Palen, "Twitter Adoption and Use in Mass Convergence and Emergency Events," Proc. Sixth Int'l ISCRAM Conf., May 2009.
-
(2009)
Proc. Sixth Int'l ISCRAM Conf.
-
-
Hughes, A.L.1
Palen, L.2
-
9
-
-
78751511305
-
Measurement and classification of humans and bots in internet chat
-
S. Gianvecchio, M. Xie, Z. Wu, and H. Wang, "Measurement and Classification of Humans and Bots in Internet Chat," Proc. 17th USENIX Security Symp., 2008.
-
(2008)
Proc. 17th USENIX Security Symp.
-
-
Gianvecchio, S.1
Xie, M.2
Wu, Z.3
Wang, H.4
-
10
-
-
74049154670
-
Your Botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your Botnet Is My Botnet: Analysis of a Botnet Takeover," Proc. 16th ACM Conf. Computer and Comm. Security, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
11
-
-
74049146069
-
Battle of botcraft: Fighting bots in online games with human observational proofs
-
S. Gianvecchio, Z. Wu, M. Xie, and H. Wang, "Battle of Botcraft: Fighting Bots in Online Games with Human Observational Proofs," Proc. 16th ACM Conf. Computer and Comm. Security, 2009.
-
(2009)
Proc. 16th ACM Conf. Computer and Comm. Security
-
-
Gianvecchio, S.1
Wu, Z.2
Xie, M.3
Wang, H.4
-
12
-
-
43449135033
-
Why we twitter: Understanding microblogging usage and communities
-
A. Java, X. Song, T. Finin, and B. Tseng, "Why We Twitter: Understanding Microblogging Usage and Communities," Proc. Ninth WebKDD and First SNA-KDD Workshop Web Mining and Social Network Analysis, 2007.
-
(2007)
Proc. Ninth WebKDD and First SNA-KDD Workshop Web Mining and Social Network Analysis
-
-
Java, A.1
Song, X.2
Finin, T.3
Tseng, B.4
-
14
-
-
77950275127
-
Detecting spam in a twitter network
-
Jan
-
S. Yardi, D. Romero, G. Schoenebeck, and D. Boyd, "Detecting Spam in a Twitter Network," First Monday, vol. 15, no. 1, Jan. 2010.
-
First Monday
, vol.15
, Issue.1
, pp. 2010
-
-
Yardi, S.1
Romero, D.2
Schoenebeck, G.3
Boyd, D.4
-
15
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K.P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and Analysis of Online Social Networks," Proc. Seventh ACM SIGCOMM Conf. Internet Measurement, 2007.
-
(2007)
Proc. Seventh ACM SIGCOMM Conf. Internet Measurement
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
16
-
-
84873439489
-
Who says what to whom on Twitter
-
S. Wu, J.M. Hofman, W.A. Mason, and D.J. Watts, "Who Says What to Whom on Twitter," Proc. 20th Int'l Conf. World Wide Web, pp. 705-714, 2011.
-
(2011)
Proc. 20th Int'l Conf. World Wide Web
, pp. 705-714
-
-
Wu, S.1
Hofman, J.M.2
Mason, W.A.3
Watts, D.J.4
-
17
-
-
77954619566
-
What is twitter, a social network or a news media?
-
H. Kwak, C. Lee, H. Park, and S. Moon, "What Is Twitter, a Social Network or a News Media?" Proc. 19th Int'l Conf. World Wide Web, pp. 591-600, 2010.
-
(2010)
Proc. 19th Int'l Conf. World Wide Web
, pp. 591-600
-
-
Kwak, H.1
Lee, C.2
Park, H.3
Moon, S.4
-
19
-
-
70450162300
-
How and why people Twitter: The role that micro-blogging plays in informal communication at work
-
D. Zhao and M.B. Rosson, "How and Why People Twitter: The Role that Micro-Blogging Plays in Informal Communication at Work," Proc. ACM Int'l Conf. Supporting Group Work, 2009.
-
(2009)
Proc. ACM Int'l Conf. Supporting Group Work
-
-
Zhao, D.1
Rosson, M.B.2
-
20
-
-
77950877530
-
Chatter on the red: What hazards threat reveals about the social life of microblogged information
-
Feb.
-
K. Starbird, L. Palen, A. Hughes, and S. Vieweg, "Chatter on the Red: What Hazards Threat Reveals about the Social Life of Microblogged Information," Proc. ACM Conf. Computer Supported Cooperative Work, Feb. 2010.
-
(2010)
Proc. ACM Conf. Computer Supported Cooperative Work
-
-
Starbird, K.1
Palen, L.2
Hughes, A.3
Vieweg, S.4
-
21
-
-
70349929576
-
Twitter power: Tweets as electronic word of mouth
-
B.J. Jansen, M. Zhang, K. Sobel, and A. Chowdury, "Twitter Power: Tweets as Electronic Word of Mouth," Am. Soc. for Information Science and Technology, vol. 60, no. 11, pp. 2169-2188, 2009.
-
(2009)
Am. Soc. for Information Science and Technology
, vol.60
, Issue.11
, pp. 2169-2188
-
-
Jansen, B.J.1
Zhang, M.2
Sobel, K.3
Chowdury, A.4
-
22
-
-
78650005374
-
@spam: The underground on 140 characters or less
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: The Underground on 140 Characters or Less," Proc. 17th ACM Conf. Computer and Comm. Security, pp. 27-37, 2010.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
23
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
K. Thomas, C. Grier, D. Song, and V. Paxson, "Suspended Accounts in Retrospect: An Analysis of Twitter Spam," Proc. ACM SIGCOMM Conf. Internet Measurement Conf., pp. 243-258, 2011.
-
(2011)
Proc. ACM SIGCOMM Conf. Internet Measurement Conf.
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
24
-
-
42149149254
-
I tube, you tube, everybody tubes: Analyzing the world's largest user generated content video system
-
M. Cha, H. Kwak, P. Rodriguez, Y.-Y. Ahn, and S. Moon, "I Tube, You Tube, Everybody Tubes: Analyzing the World's Largest User Generated Content Video System," Proc. Seventh ACM SIGCOMM Conf. Internet Measurement, 2007.
-
(2007)
Proc. Seventh ACM SIGCOMM Conf. Internet Measurement
-
-
Cha, M.1
Kwak, H.2
Rodriguez, P.3
Ahn, Y.-Y.4
Moon, S.5
-
26
-
-
48649108112
-
Honeyim: Fast detection and suppression of instant messaging malware in enterprise-like networks
-
M. Xie, Z. Wu, and H. Wang, "Honeyim: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks," Proc. 23rd Ann. Computer Security Applications Conf., 2007.
-
(2007)
Proc. 23rd Ann. Computer Security Applications Conf.
-
-
Xie, M.1
Wu, Z.2
Wang, H.3
-
31
-
-
77957942658
-
-
Feb.
-
Twitter, "Twitter api Wiki," http://apiwiki.twitter.com/, Feb. 2010.
-
(2010)
Twitter Api Wiki
-
-
-
32
-
-
77953303843
-
Walking in facebook: A case study of unbiased sampling of osns
-
Mar.
-
M. Gjoka, M. Kurant, C.T. Butts, and A. Markopoulou, "Walking in Facebook: A Case Study of Unbiased Sampling of Osns," Proc. 27th IEEE Int'l Conf. Computer Comm., Mar. 2010.
-
(2010)
Proc. 27th IEEE Int'l Conf. Computer Comm.
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.T.3
Markopoulou, A.4
-
33
-
-
0033705620
-
On near-uniform url sampling
-
May
-
M.R. Henzinger, A. Heydon, M. Mitzenmacher, and M. Najork, "On Near-Uniform Url Sampling," Proc. Ninth Int'l World Wide Web Conf. Computer Networks, May 2000.
-
(2000)
Proc. Ninth Int'l World Wide Web Conf. Computer Networks
-
-
Henzinger, M.R.1
Heydon, A.2
Mitzenmacher, M.3
Najork, M.4
-
34
-
-
0002988210
-
Computing machinery and intelligence
-
A.M. Turing, "Computing Machinery and Intelligence," Mind, vol. 59, pp. 433-460, 1950.
-
(1950)
Mind
, vol.59
, pp. 433-460
-
-
Turing, A.M.1
-
35
-
-
0031611375
-
Measuring regularity by means of a corrected conditional entropy in sympathetic outflow
-
A. Porta, G. Baselli, D. Liberati, N. Montano, C. Cogliati, T. Gnecchi-Ruscone, A. Malliani, and S. Cerutti, "Measuring Regularity by Means of a Corrected Conditional Entropy in Sympathetic Outflow," Biological Cybernetics, vol. 78, no. 1, pp. 71-78, 1998. (Pubitemid 128636376)
-
(1998)
Biological Cybernetics
, vol.78
, Issue.1
, pp. 71-78
-
-
Porta, A.1
Baselli, G.2
Liberati, D.3
Montano, N.4
Cogliati, C.5
Gnecchi-Ruscone, T.6
Malliani, A.7
Cerutti, S.8
-
36
-
-
0026225958
-
Local area network traffic characteristics, with implications for broadband network congestion management
-
Sept
-
H.J. Fowler and W.E. Leland, "Local Area Network Traffic Characteristics, with Implications for Broadband Network Congestion Management," IEEE J. Selected Areas in Comm., vol. 9, no. 7, pp. 1139-1149, Sept. 1991.
-
(1991)
IEEE J. Selected Areas in Comm.
, vol.9
, Issue.7
, pp. 1139-1149
-
-
Fowler, H.J.1
Leland, W.E.2
-
37
-
-
42149131458
-
Characterizing residential broadband networks
-
M. Dischinger, A. Haeberlen, K.P. Gummadi, and S. Saroiu, "Characterizing Residential Broadband Networks," Proc. Seventh ACM SIGCOMM Conf. Internet Measurement, 2007.
-
(2007)
Proc. Seventh ACM SIGCOMM Conf. Internet Measurement
-
-
Dischinger, M.1
Haeberlen, A.2
Gummadi, K.P.3
Saroiu, S.4
-
38
-
-
84866626523
-
-
Feb.
-
Tweetadder, "Automatic Twitter Software," http://www. tweetadder.com/, Feb. 2010.
-
(2010)
Automatic Twitter Software
-
-
-
42
-
-
85016567947
-
Complexity and adaptation
-
B.A. Huberman and T. Hogg, "Complexity and Adaptation," Physics D, vol. 2, nos. 1-3, pp. 376-384, 1986.
-
(1986)
Physics D
, vol.2
, Issue.1-3
, pp. 376-384
-
-
Huberman, B.A.1
Hogg, T.2
-
43
-
-
0031611375
-
Measuring regularity by means of a corrected conditional entropy in sympathetic outflow
-
A. Porta, G. Baselli, D. Liberati, N. Montano, C. Cogliati, T. Gnecchi-Ruscone, A. Malliani, and S. Cerutti, "Measuring Regularity by Means of a Corrected Conditional Entropy in Sympathetic Outflow," Biological Cybernetics, vol. 78, no. 1, pp. 71-78, Jan. 1998. (Pubitemid 128636376)
-
(1998)
Biological Cybernetics
, vol.78
, Issue.1
, pp. 71-78
-
-
Porta, A.1
Baselli, G.2
Liberati, D.3
Montano, N.4
Cogliati, C.5
Gnecchi-Ruscone, T.6
Malliani, A.7
Cerutti, S.8
-
44
-
-
0002442796
-
Machine learning in automated text categorization
-
F. Sebastiani, "Machine Learning in Automated Text Categorization," ACM Computing Surveys, vol. 34, no. 1, pp. 1-47, 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.1
, pp. 1-47
-
-
Sebastiani, F.1
-
46
-
-
84866625999
-
-
Feb.
-
Google, "Google Safe Browsing API," http://code.google.com/ apis/safebrowsing/, Feb. 2010.
-
(2010)
Google Safe Browsing API
-
-
-
49
-
-
84866610595
-
-
Aug.
-
"Surbl," http://www.surbl.org/lists, Aug. 2011.
-
(2011)
-
-
-
50
-
-
84866614236
-
-
Aug.
-
"The Spamhaus Project," http://www.spamhaus.org/, Aug. 2011.
-
(2011)
-
-
-
51
-
-
0035478854
-
Random forests
-
DOI 10.1023/A:1010933404324
-
L. Breiman, "Random Forests," Machine Learning, vol. 45, pp. 5-32, 2001. (Pubitemid 32933532)
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
52
-
-
0032139235
-
The random subspace method for constructing decision forests
-
T.K. Ho, "The Random Subspace Method for Constructing Decision Forests," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 832-844, Aug. 1998. (Pubitemid 128741345)
-
(1998)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.8
, pp. 832-844
-
-
Ho, T.K.1
-
54
-
-
76749092270
-
The weka data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I.H. Witten, "The Weka Data Mining Software: An Update," ACM SIGKDD Explorations Newsletter, vol. 11, pp. 10-18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
|