메뉴 건너뛰기




Volumn 40, Issue 8, 2013, Pages 2992-3000

Detecting malicious tweets in trending topics using a statistical analysis of language

Author keywords

Machine learning; Social network; Spam detection; Statistical natural language processing

Indexed keywords

F-MEASURE; LARGE DATASET; MICROBLOGGING; REAL TIME; SETS OF FEATURES; SOCIAL NETWORKS; SPAM DETECTION; SPAMMERS; STATE-OF-THE-ART SYSTEM; STATISTICAL NATURAL LANGUAGE PROCESSING; TRENDING TOPICS;

EID: 84874648289     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2012.12.015     Document Type: Article
Times cited : (165)

References (37)
  • 2
    • 77955693748 scopus 로고    scopus 로고
    • Web spam detection: New classification features based on qualified link analysis and language models
    • L. Araujo, and J. Martinez-Romo Web spam detection: new classification features based on qualified link analysis and language models IEEE Transactions on Information Forensics and Security 5 3 2010 581 590
    • (2010) IEEE Transactions on Information Forensics and Security , vol.5 , Issue.3 , pp. 581-590
    • Araujo, L.1    Martinez-Romo, J.2
  • 6
    • 85024115120 scopus 로고    scopus 로고
    • An empirical study of smoothing techniques for language modeling
    • ACL '96. Association for Computational Linguistics, Stroudsburg, PA, USA
    • Chen, S. F.; & Goodman, J.; 1996. An empirical study of smoothing techniques for language modeling. In Proceedings of the 34th annual meeting on Association for Computational Linguistics. ACL '96. Association for Computational Linguistics, Stroudsburg, PA, USA (pp. 310-318). http://dx.doi.org/10.3115/981863.981904.
    • (1996) Proceedings of the 34th Annual Meeting on Association for Computational Linguistics , pp. 310-318
    • Chen, S.F.1    Goodman, J.2
  • 7
    • 84870242828 scopus 로고    scopus 로고
    • Representative reviewers for internet social media
    • S.-M. Choi, and Y.-S. Han Representative reviewers for internet social media Expert Systems with Applications. 40 4 2012 1274 1282
    • (2012) Expert Systems with Applications. , vol.40 , Issue.4 , pp. 1274-1282
    • Choi, S.-M.1    Han, Y.-S.2
  • 13
    • 67349246464 scopus 로고    scopus 로고
    • A review of machine learning approaches to spam filtering
    • T.S. Guzella, and W.M. Caminhas A review of machine learning approaches to spam filtering Expert Systems with Applications 36 7 2009 10206 10222
    • (2009) Expert Systems with Applications , vol.36 , Issue.7 , pp. 10206-10222
    • Guzella, T.S.1    Caminhas, W.M.2
  • 14
    • 84865260256 scopus 로고    scopus 로고
    • Unsupervised and supervised learning to evaluate event relatedness based on content mining from social-media streams
    • C.-H. Lee Unsupervised and supervised learning to evaluate event relatedness based on content mining from social-media streams Expert Systems with Applications 39 18 2012 13338 13356
    • (2012) Expert Systems with Applications , vol.39 , Issue.18 , pp. 13338-13356
    • Lee, C.-H.1
  • 19
    • 78651099783 scopus 로고    scopus 로고
    • Twitter-based botnet command channel
    • (accessed April 1, 2010)
    • Nazario, J. (2009). Twitter-based botnet command channel. Arbor Networks. (accessed April 1, 2010).
    • (2009) Arbor Networks
    • Nazario, J.1
  • 20
    • 45849119469 scopus 로고    scopus 로고
    • Computation of distances for regular and context-free probabilistic languages
    • M.-J. Nederhof, and G. Satta Computation of distances for regular and context-free probabilistic languages Theoretical Computer Science 395 23 2008 235 254 http://www.sciencedirect.com/science/article/pii/S0304397508000388
    • (2008) Theoretical Computer Science , vol.395 , Issue.23 , pp. 235-254
    • Nederhof, M.-J.1    Satta, G.2
  • 21
    • 84861186486 scopus 로고    scopus 로고
    • Soft computing based imputation and hybrid data and text mining: The case of predicting the severity of phishing alerts
    • K.J. Nishanth, V. Ravi, N. Ankaiah, and I. Bose Soft computing based imputation and hybrid data and text mining: The case of predicting the severity of phishing alerts Expert Systems with Applications 39 12 2012 10583 10589
    • (2012) Expert Systems with Applications , vol.39 , Issue.12 , pp. 10583-10589
    • Nishanth, K.J.1    Ravi, V.2    Ankaiah, N.3    Bose, I.4
  • 23
    • 84874664509 scopus 로고    scopus 로고
    • Phishgillnet-phishing detection using probabilistic latent semantic analysis
    • V. Ramanathan, and H. Wechsler Phishgillnet-phishing detection using probabilistic latent semantic analysis EURASIP Journal on Information Security 2012 1 2012 1
    • (2012) EURASIP Journal on Information Security , vol.2012 , Issue.1 , pp. 1
    • Ramanathan, V.1    Wechsler, H.2
  • 25
    • 48749128394 scopus 로고    scopus 로고
    • Collaborative spam filtering with heterogeneous agents
    • D.-H. Shih, H.-S. Chiang, and B. Lin Collaborative spam filtering with heterogeneous agents Expert Systems with Applications 35 4 2008 1555 1566 http://www.sciencedirect.com/science/article/pii/S0957417407003715
    • (2008) Expert Systems with Applications , vol.35 , Issue.4 , pp. 1555-1566
    • Shih, D.-H.1    Chiang, H.-S.2    Lin, B.3
  • 26
    • 84863156952 scopus 로고    scopus 로고
    • Spam filtering in twitter using sender-receiver relationship
    • R. Sommer, D. Balzarotti, G. Maier, Lecture notes in computer science Springer Berlin/Heidelberg
    • J. Song, S. Lee, and J. Kim Spam filtering in twitter using sender-receiver relationship R. Sommer, D. Balzarotti, G. Maier, Recent advances in intrusion detection Lecture notes in computer science Vol. 6961 2011 Springer Berlin/Heidelberg 301 317
    • (2011) Recent Advances in Intrusion Detection , vol.6961 , pp. 301-317
    • Song, J.1    Lee, S.2    Kim, J.3
  • 32
    • 84857554841 scopus 로고    scopus 로고
    • Machine learning for the detection of spam in twitter networks
    • M.S. Obaidat, G.A. Tsihrintzis, J. Filipe, Communications in computer and information science Springer Berlin Heidelberg
    • A.H. Wang Machine learning for the detection of spam in twitter networks M.S. Obaidat, G.A. Tsihrintzis, J. Filipe, e-Business and telecommunications Communications in computer and information science Vol. 222 2012 Springer Berlin Heidelberg 319 333
    • (2012) E-Business and Telecommunications , vol.222 , pp. 319-333
    • Wang, A.H.1
  • 34
    • 84863160317 scopus 로고    scopus 로고
    • Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
    • R. Sommer, D. Balzarotti, G. Maier, Lecture notes in computer science Springer Berlin/Heidelberg
    • C. Yang, R. Harkreader, and G. Gu Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers R. Sommer, D. Balzarotti, G. Maier, Recent advances in intrusion detection Lecture notes in computer science Vol. 6961 2011 Springer Berlin/Heidelberg 318 337
    • (2011) Recent Advances in Intrusion Detection , vol.6961 , pp. 318-337
    • Yang, C.1    Harkreader, R.2    Gu, G.3
  • 35
    • 84860872656 scopus 로고    scopus 로고
    • Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter
    • ACM New York, NY, USA 10.1145/2187836.2187847
    • C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter Proceedings of the 21st international conference on World Wide Web. WWW '12 2012 ACM New York, NY, USA 71 80 10.1145/2187836.2187847
    • (2012) Proceedings of the 21st International Conference on World Wide Web. WWW '12 , pp. 71-80
    • Yang, C.1    Harkreader, R.2    Zhang, J.3    Shin, S.4    Gu, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.