-
1
-
-
84887187108
-
The influence of social norms on synchronous versus asynchronous communication technologies
-
New York, NY, USA. ACM
-
A. Almaatouq, F. Alhasoun, R. Campari, and A. Alfaris. The influence of social norms on synchronous versus asynchronous communication technologies. In Proceedings of the 1st ACM International Workshop on Personal Data Meets Distributed Multimedia, PDM '13, pages 39-42, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 1st ACM International Workshop on Personal Data Meets Distributed Multimedia, PDM '13
, pp. 39-42
-
-
Almaatouq, A.1
Alhasoun, F.2
Campari, R.3
Alfaris, A.4
-
2
-
-
83655202879
-
Stealing reality: When criminals become data scientists (or vice versa)
-
Y. Altshuler, N. Aharony, A. Pentland, Y. Elovici, and M. Cebrian. Stealing reality: When criminals become data scientists (or vice versa). IEEE Intelligent Systems, 26(6):22-30, 2011.
-
(2011)
IEEE Intelligent Systems
, vol.26
, Issue.6
, pp. 22-30
-
-
Altshuler, Y.1
Aharony, N.2
Pentland, A.3
Elovici, Y.4
Cebrian, M.5
-
3
-
-
84860848688
-
Detecting spammers on twitter
-
July
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on Twitter. In Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), July 2010.
-
(2010)
Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
4
-
-
84863500861
-
Characterizing and modeling an electoral campaign in the context of twitter: 2011 spanish presidential election as a case study
-
J. Borondo, A. J. Morales, J. C. Losada, and R. M. Benito. Characterizing and modeling an electoral campaign in the context of Twitter: 2011 Spanish Presidential election as a case study. Chaos: An Interdisciplinary Journal of Nonlinear Science, 22(2), 2012.
-
(2012)
Chaos: An Interdisciplinary Journal of Nonlinear Science
, vol.22
, Issue.2
-
-
Borondo, J.1
Morales, A.J.2
Losada, J.C.3
Benito, R.M.4
-
5
-
-
0035648637
-
A faster algorithm for betweenness centrality
-
U. Brandes. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology, 25:163-177, 2001. (Pubitemid 33398479
-
(2001)
Journal of Mathematical Sociology
, vol.25
, Issue.2
, pp. 163-177
-
-
Brandes, U.1
-
6
-
-
80053647307
-
Phi.sh/$ocial: The phishing landscape through short urls
-
New York, NY, USA, ACM
-
S. Chhabra, A. Aggarwal, F. Benevenuto, and P. Kumaraguru. Phi.sh/$ocial: The phishing landscape through short urls. In Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS '11, pages 92-101, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS '11
, pp. 92-101
-
-
Chhabra, S.1
Aggarwal, A.2
Benevenuto, F.3
Kumaraguru, P.4
-
7
-
-
65549085067
-
Power-law distributions in empirical data
-
Nov
-
A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM Rev., 51(4):661-703, Nov. 2009.
-
(2009)
SIAM Rev
, vol.51
, Issue.4
, pp. 661-703
-
-
Clauset, A.1
Shalizi, C.R.2
Newman, M.E.J.3
-
8
-
-
85126984607
-
Political polarization on twitter
-
M. Conover, J. Ratkiewicz, M. Francisco, B. Gonçalves, A. Flammini, and F. Menczer. Political polarization on twitter. In Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM), 2011.
-
(2011)
Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM
-
-
Conover, M.1
Ratkiewicz, J.2
Francisco, M.3
Gonçalves, B.4
Flammini, A.5
Menczer, F.6
-
10
-
-
84865730611
-
A set of measures of centrality based on betweenness
-
Mar
-
L. C. Freeman. A Set of Measures of Centrality Based on Betweenness. Sociometry, 40(1):35-41, Mar. 1977.
-
(1977)
Sociometry
, vol.40
, Issue.1
, pp. 35-41
-
-
Freeman, L.C.1
-
11
-
-
84860851065
-
Understanding and combating link farming in the twitter social network
-
New York, NY, USA, ACM
-
S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages 61-70, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 21st International Conference on World Wide Web, WWW '12
, pp. 61-70
-
-
Ghosh, S.1
Viswanath, B.2
Kooti, F.3
Sharma, N.K.4
Korlam, G.5
Benevenuto, F.6
Ganguly, N.7
Gummadi, K.P.8
-
14
-
-
78650005374
-
Spam: The underground on 140 characters or less
-
New York, NY, USA. ACM
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: The underground on 140 characters or less. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 27-37, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
15
-
-
84904486992
-
Network analysis of three twitter functions: Favorite, follow and mention
-
In D. Richards and B. Kang, editors. Of Lecture Notes in Computer Science. Springer Berlin Heidelberg
-
S. Kato, A. Koide, T. Fushimi, K. Saito, and H. Motoda. Network analysis of three twitter functions: Favorite, follow and mention. In D. Richards and B. Kang, editors, Knowledge Management and Acquisition for Intelligent Systems, volume 7457 of Lecture Notes in Computer Science, pages 298-312. Springer Berlin Heidelberg, 2012.
-
(2012)
Knowledge Management and Acquisition for Intelligent Systems
, vol.7457
, pp. 298-312
-
-
Kato, S.1
Koide, A.2
Fushimi, T.3
Saito, K.4
Motoda, H.5
-
16
-
-
84879762451
-
Bias: Measuring the tweeting behavior of propagandists
-
C. Lumezanu, N. Feamster, and H. Klein. bias: Measuring the tweeting behavior of propagandists. In ICWSM, 2012.
-
(2012)
ICWSM
-
-
Lumezanu, C.1
Feamster, N.2
Klein, H.3
-
17
-
-
79958165921
-
Twitinfo: Aggregating and visualizing microblogs for event exploration
-
New York, NY, USA, ACM
-
A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger, S. Madden, and R. C. Miller. Twitinfo: Aggregating and visualizing microblogs for event exploration. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 227-236, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11
, pp. 227-236
-
-
Marcus, A.1
Bernstein, M.S.2
Badar, O.3
Karger, D.R.4
Madden, S.5
Miller, R.C.6
-
18
-
-
80052767040
-
Spam detection on twitter using traditional classifiers
-
Berlin, Heidelberg. Springer-Verlag
-
M. McCord and M. Chuah. Spam detection on twitter using traditional classifiers. In Proceedings of the 8th international conference on Autonomic and trusted computing, ATC'11, pages 175-186, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC'11
, pp. 175-186
-
-
McCord, M.1
Chuah, M.2
-
19
-
-
84892704954
-
Is the sample good enough? Comparing data from twitter's streaming api with twitter's firehose
-
F. Morstatter, J. Pfeffer, H. Liu, and K. M. Carley. Is the sample good enough? comparing data from Twitter's streaming API with Twitter's Firehose. Proceedings of ICWSM, 2013.
-
(2013)
Proceedings of ICWSM
-
-
Morstatter, F.1
Pfeffer, J.2
Liu, H.3
Carley, K.M.4
-
20
-
-
24744469980
-
Power laws, pareto distributions and zipf's law
-
December
-
M. E. J. Newman. Power laws, pareto distributions and zipf's law. Contemporary Physics, 46:323-351, December 2005.
-
(2005)
Contemporary Physics
, vol.46
, pp. 323-351
-
-
Newman, M.E.J.1
-
22
-
-
84891537993
-
Analysis of malware propagation in twitter
-
A. Sanzgiri, A. Hughes, and S. Upadhyaya. Analysis of malware propagation in twitter. Reliable Distributed Systems, IEEE Symposium on, 0:195-204, 2013.
-
(2013)
Reliable Distributed Systems IEEE Symposium on
, vol.0
, pp. 195-204
-
-
Sanzgiri, A.1
Hughes, A.2
Upadhyaya, S.3
-
23
-
-
84866599022
-
Poultry markets: On the underground economy of twitter followers
-
New York, NY, USA, ACM
-
G. Stringhini, M. Egele, C. Kruegel, and G. Vigna. Poultry markets: On the underground economy of twitter followers. In Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks, WOSN '12, pages 1-6, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks, WOSN '12
, pp. 1-6
-
-
Stringhini, G.1
Egele, M.2
Kruegel, C.3
Vigna, G.4
-
25
-
-
78951494937
-
Sentiment in twitter events
-
Feb
-
M. Thelwall, K. Buckley, and G. Paltoglou. Sentiment in twitter events. J. Am. Soc. Inf. Sci. Technol., 62(2):406-418, Feb. 2011.
-
(2011)
J. Am. Soc. Inf. Sci. Technol
, vol.62
, Issue.2
, pp. 406-418
-
-
Thelwall, M.1
Buckley, K.2
Paltoglou, G.3
-
27
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
New York, NY, USA, ACM
-
K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pages 243-258, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
28
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
-
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse. In Proceedings of the 22nd Usenix Security Symposium, 2013.
-
(2013)
Proceedings of the 22nd Usenix Security Symposium
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
29
-
-
84904470561
-
-
Twitter. [Online; Accessed 22-October-2013]
-
Twitter. Following rules and best practices. https://support.twitter.com/ articles/68916-following-rules-And-best-practices, 2012. [Online; accessed 22-October-2013].
-
(2012)
Following Rules and Best Practices
-
-
-
30
-
-
84904509148
-
-
Twitter. [Online; accessed 1-October-2013]
-
Twitter. Public stream. https://dev.twitter.com/docs/streaming-Apis/, 2012. [Online; accessed 1-October-2013].
-
(2012)
Public Stream
-
-
-
31
-
-
84904469759
-
-
Twitter. [Online; accessed 1-October-2013]
-
Twitter. Rules. https://support.twitter.com/articles/18311-The-Twitter- rules, 2012. [Online; accessed 1-October-2013].
-
(2012)
Rules
-
-
-
32
-
-
84904464034
-
-
Twitter. [Online; accessed 5-October-2013]
-
Twitter. Initial public offering of shares of common stock of twitter, inc. http://www.sec.gov/Archives/edgar/data/1418091/000119312513390321/ d564001ds1.htm, 2013. [Online; accessed 5-October-2013].
-
(2013)
Initial Public Offering of Shares of Common Stock of Twitter, Inc
-
-
-
34
-
-
85180412749
-
Social turing tests: Crowdsourcing sybil detection
-
The Internet Society
-
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. J. Metzger, H. Zheng, and B. Y. Zhao. Social turing tests: Crowdsourcing sybil detection. In NDSS. The Internet Society, 2013.
-
(2013)
NDSS
-
-
Wang, G.1
Mohanlal, M.2
Wilson, C.3
Wang, X.4
Metzger, M.J.5
Zheng, H.6
Zhao, B.Y.7
-
35
-
-
84869387230
-
Innocent by association: Early recognition of legitimate users
-
New York, NY, USA, ACM
-
Y. Xie, F. Yu, Q. Ke, M. Abadi, E. Gillum, K. Vitaldevaria, J. Walter, J. Huang, and Z. M. Mao. Innocent by association: Early recognition of legitimate users. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 353-364, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 353-364
-
-
Xie, Y.1
Yu, F.2
Ke, Q.3
Abadi, M.4
Gillum, E.5
Vitaldevaria, K.6
Walter, J.7
Huang, J.8
Mao, Z.M.9
-
36
-
-
84863160317
-
Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers
-
In R. Sommer, D. Balzarotti, and G. Maier, editors. Of Lecture Notes in Computer Science,. Springer Berlin Heidelberg
-
C. Yang, R. Harkreader, and G. Gu. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In R. Sommer, D. Balzarotti, and G. Maier, editors, Recent Advances in Intrusion Detection, volume 6961 of Lecture Notes in Computer Science, pages 318-337. Springer Berlin Heidelberg, 2011.
-
(2011)
Recent Advances in Intrusion Detection
, vol.6961
, pp. 318-337
-
-
Yang, C.1
Harkreader, R.2
Gu, G.3
-
37
-
-
84860872656
-
Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter
-
New York, NY, USA, ACM
-
C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web, WWW '12, pages 71-80, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 21st International Conference on World Wide Web, WWW '12
, pp. 71-80
-
-
Yang, C.1
Harkreader, R.2
Zhang, J.3
Shin, S.4
Gu, G.5
-
38
-
-
79952907127
-
Detecting and analyzing automated activity on twitter
-
Berlin, Heidelberg. Springer-Verlag
-
C. M. Zhang and V. Paxson. Detecting and analyzing automated activity on twitter. In Proceedings of the 12th international conference on Passive and active measurement, PAM'11, pages 102-111, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 12th International Conference on Passive and Active Measurement, PAM'11
, pp. 102-111
-
-
Zhang, C.M.1
Paxson, V.2
|