-
1
-
-
78751502334
-
Detecting spammers on social networks
-
Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: ACSAC 2010 Conference Proceedings, pp. 1-9 (2010)
-
(2010)
ACSAC 2010 Conference Proceedings
, pp. 1-9
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
2
-
-
77954619566
-
What is twitter, a social network or a news media?
-
Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: WWW 2010 Conference Proceedings, pp. 591-600 (2010)
-
(2010)
WWW 2010 Conference Proceedings
, pp. 591-600
-
-
Kwak, H.1
Lee, C.2
Park, H.3
Moon, S.4
-
3
-
-
80053291127
-
Rumor has it: Identifying misinformation in microblogs
-
Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: identifying misinformation in microblogs. In: EMNLP 2011 Conference Proceedings, pp. 1589-1599 (2011)
-
(2011)
EMNLP 2011 Conference Proceedings
, pp. 1589-1599
-
-
Qazvinian, V.1
Rosengren, E.2
Radev, D.R.3
Mei, Q.4
-
4
-
-
79956048659
-
Twitter under crisis: Can we trust what we rt?
-
Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: Can we trust what we rt? In: Proceedings of the First Workshop on Social Media Analytics, pp. 71-79 (2010)
-
(2010)
Proceedings of the First Workshop on Social Media Analytics
, pp. 71-79
-
-
Mendoza, M.1
Poblete, B.2
Castillo, C.3
-
5
-
-
78650005374
-
@spam: The underground on 140 characters or less
-
Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: CCS 2010 Conference Proceedings, pp. 27-37 (2010)
-
(2010)
CCS 2010 Conference Proceedings
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
6
-
-
80052767040
-
Spam detection on twitter using traditional classifiers
-
Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X.,Wang, Y. (eds.) ATC 2011. Springer, Heidelberg
-
McCord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X.,Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 175-186. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6906
, pp. 175-186
-
-
McCord, M.1
Chuah, M.2
-
7
-
-
84904429895
-
Compa: Detecting compromised accounts on social networks
-
Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: Compa: Detecting compromised accounts on social networks. In: Symposium on Network and Distributed System Security, NDSS (2013)
-
Symposium on Network and Distributed System Security, NDSS (2013)
-
-
Egele, M.1
Stringhini, G.2
Kruegel, C.3
Vigna, G.4
-
8
-
-
78650880229
-
Detecting and characterizing social spam campaigns
-
Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: IMC 2010 Conference Proceedings, pp. 35-47 (2010)
-
(2010)
IMC 2010 Conference Proceedings
, pp. 35-47
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
9
-
-
84866599022
-
Poultry markets: On the underground economy of twitter followers
-
Stringhini, G., Egele, M., Kruegel, C., Vigna, G.: Poultry markets: On the underground economy of twitter followers. In: WOSN 2012 Conference Proceedings, pp. 1-6 (2012)
-
(2012)
WOSN 2012 Conference Proceedings
, pp. 1-6
-
-
Stringhini, G.1
Egele, M.2
Kruegel, C.3
Vigna, G.4
-
10
-
-
84860851065
-
Understanding and combating link farming in the twitter social network
-
Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: WWW 2012 Conference Proceedings, pp. 61-70 (2012)
-
(2012)
WWW 2012 Conference Proceedings
, pp. 61-70
-
-
Ghosh, S.1
Viswanath, B.2
Kooti, F.3
Sharma, N.K.4
Korlam, G.5
Benevenuto, F.6
Ganguly, N.7
Gummadi, K.P.8
-
11
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: IMC 2011 Conference Proceedings, pp. 243-258 (2011)
-
(2011)
IMC 2011 Conference Proceedings
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
12
-
-
84860872656
-
Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter
-
Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW 2012 Conference Proceedings, pp. 71-80 (2012)
-
(2012)
WWW 2012 Conference Proceedings
, pp. 71-80
-
-
Yang, C.1
Harkreader, R.2
Zhang, J.3
Shin, S.4
Gu, G.5
-
13
-
-
84860848688
-
Detecting spammers on twitter
-
Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6 (2010)
-
(2010)
Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS)
, vol.6
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
14
-
-
77956044597
-
Uncovering social spammers: Social honeypots+ machine learning
-
Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: SIGIR 2010 Conference Proceedings, pp. 435-442 (2010)
-
(2010)
SIGIR 2010 Conference Proceedings
, pp. 435-442
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
15
-
-
84868290015
-
Discovering spammers in social networks
-
Zhu, Y., Wang, X., Zhong, E., Liu, N.N., Li, H., Yang, Q.: Discovering spammers in social networks. In: AAAI 2012 Conference Proceedings, pp. 171-177 (2012)
-
(2012)
AAAI 2012 Conference Proceedings
, pp. 171-177
-
-
Zhu, Y.1
Wang, X.2
Zhong, E.3
Liu, N.N.4
Li, H.5
Yang, Q.6
-
16
-
-
84890768200
-
Measuring user influence in twitter: The million follower fallacy
-
Cha, M., Haddadi, H., Benevenuto, F., Gummadi, P.K.: Measuring user influence in twitter: The million follower fallacy. ICWSM 10, 10-17 (2010)
-
(2010)
ICWSM
, vol.10
, pp. 10-17
-
-
Cha, M.1
Haddadi, H.2
Benevenuto, F.3
Gummadi, P.K.4
-
17
-
-
33745924500
-
The author-topic model for authors and documents
-
Rosen-Zvi, M., Griffiths, T., Steyvers, M., Smyth, P.: The author-topic model for authors and documents. In: UAI 2004 Conference Proceedings, pp. 487-494 (2004)
-
(2004)
UAI 2004 Conference Proceedings
, pp. 487-494
-
-
Rosen-Zvi, M.1
Griffiths, T.2
Steyvers, M.3
Smyth, P.4
-
18
-
-
84863381525
-
Reading tea leaves: How humans interpret topic models
-
Chang, J., Gerrish, S., Wang, C., Boyd-graber, J.L., Blei, D.M.: Reading tea leaves: How humans interpret topic models. In: Advances in Neural Information Processing Systems, pp. 288-296 (2009)
-
(2009)
Advances in Neural Information Processing Systems
, pp. 288-296
-
-
Chang, J.1
Gerrish, S.2
Wang, C.3
Boyd-graber, J.L.4
Blei, D.M.5
-
19
-
-
79958143779
-
Fragile online relationship: A first look at unfollow dynamics in twitter
-
Kwak, H., Chun, H., Moon, S.: Fragile online relationship: a first look at unfollow dynamics in twitter. In: CHI 2011 Conference Proceedings, pp. 1091-1100 (2011)
-
(2011)
CHI 2011 Conference Proceedings
, pp. 1091-1100
-
-
Kwak, H.1
Chun, H.2
Moon, S.3
-
21
-
-
0030370417
-
Bagging, boosting, and c4. 5
-
Quinlan, J.R.: Bagging, boosting, and c4. 5. In: AAAI/IAAI, vol. 1, pp. 725-730 (1996)
-
(1996)
AAAI/IAAI
, vol.1
, pp. 725-730
-
-
Quinlan, J.R.1
|