-
2
-
-
84860848688
-
Detecting spammers on twitter
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting Spammers on Twitter. In Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), Volume 6, 2010.
-
(2010)
Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS)
, vol.6
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
3
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your Contacts are Belong to us: Automated Identity Theft Attacks on Social Networks. In Proceedings of the 18th International Conference on WWW, pages 551-560, 2009.
-
(2009)
Proceedings of the 18th International Conference on WWW
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
4
-
-
85107362379
-
NLTK: The natural language toolkit
-
Stroudsburg, PA, USA Association for Computational Linguistics
-
S. Bird. NLTK: The Natural Language Toolkit. In Proceedings of the COLING/ACL on Interactive Presentation Sessions, COLING-ACL'06, pages 69-72, Stroudsburg, PA, USA, 2006. Association for Computational Linguistics.
-
(2006)
Proceedings of the COLING/ACL on Interactive Presentation Sessions, COLING-ACL'06
, pp. 69-72
-
-
Bird, S.1
-
5
-
-
77951739184
-
Tweet, tweet, retweet: Conversational aspects of retweeting on twitter
-
D. Boyd, S. Golder, and G. Lotan. Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter. In 43rd Hawaii International Conference on System Sciences (HICSS), pages 1-10, 2010.
-
(2010)
43rd Hawaii International Conference on System Sciences (HICSS)
, pp. 1-10
-
-
Boyd, D.1
Golder, S.2
Lotan, G.3
-
6
-
-
84874487971
-
Quantitative approaches to comparing communication patterns on twitter
-
December
-
A. Bruns and S. Stieglitz. Quantitative Approaches to Comparing Communication Patterns on Twitter. Journal of Technology in Human Services, 30(3-4): 160-185, December 2012.
-
(2012)
Journal of Technology in Human Services
, vol.30
, Issue.3-4
, pp. 160-185
-
-
Bruns, A.1
Stieglitz, S.2
-
9
-
-
78751493674
-
Who is tweeting on twitter: Human, bot, or cyborg?
-
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Who is Tweeting on Twitter: Human, Bot, or Cyborg? In Proceedings of the 26th Annual Computer Security Applications Conference, pages 21-30, 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 21-30
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
11
-
-
84860851065
-
Understanding and combating link farming in the twitter social network
-
S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and P. K. Gummadi. Understanding and Combating Link Farming in the Twitter Social Network. In Proceedings of the 21st International Conference on WWW, pages 61-70, 2012.
-
(2012)
Proceedings of the 21st International Conference on WWW
, pp. 61-70
-
-
Ghosh, S.1
Viswanath, B.2
Kooti, F.3
Sharma, N.K.4
Korlam, G.5
Benevenuto, F.6
Ganguly, N.7
Gummadi, P.K.8
-
12
-
-
78650005374
-
@ spam: The underground on 140 characters or less
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang. @ spam: the Underground on 140 Characters or Less. In Proceedings of the 17th ACM Conference on Computer and Communications Security, pages 27-37, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
13
-
-
36348956237
-
Fighting spam on social web sites: A survey of approaches and future challenges
-
P. Heymann, G. Koutrika, and H. Garcia-Molina. Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges. Internet Computing, IEEE, 11(6): 36-45, 2007.
-
(2007)
Internet Computing, IEEE
, vol.11
, Issue.6
, pp. 36-45
-
-
Heymann, P.1
Koutrika, G.2
Garcia-Molina, H.3
-
15
-
-
84957069814
-
Text categorization with support vector machines: Learning with many relevant features
-
T. Joachims. Text Categorization with Support Vector Machines: Learning with Many Relevant Features. Machine Learning: ECML-98, pages 137-142, 1998.
-
(1998)
Machine Learning: ECML-98
, pp. 137-142
-
-
Joachims, T.1
-
16
-
-
84860572561
-
Detecting collective attention spam
-
K. Lee, J. Caverlee, K. Y. Kamath, and Z. Cheng. Detecting Collective Attention Spam. In Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality, pages 48-55, 2012.
-
(2012)
Proceedings of the 2nd Joint WICOW/AIRWeb Workshop on Web Quality
, pp. 48-55
-
-
Lee, K.1
Caverlee, J.2
Kamath, K.Y.3
Cheng, Z.4
-
19
-
-
84877300575
-
WarningBird: A near real-time detection system for suspicious URLs in twitter stream
-
S. Lee and J. Kim. WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream. IEEE Transactions on Dependable and Secure Computing, 10(3): 183-195, 2013.
-
(2013)
IEEE Transactions on Dependable and Secure Computing
, vol.10
, Issue.3
, pp. 183-195
-
-
Lee, S.1
Kim, J.2
-
20
-
-
84905664863
-
-
Twitter now has more than 200 million monthly active users
-
Mashable. Twitter now has more than 200 million monthly active users http://mashable.com/2012/12/18/twitter-200-million-active-users/.
-
-
-
-
22
-
-
80555140075
-
Scikit-learn: Machine learning in python
-
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research, 12: 2825-2830, 2011.
-
(2011)
Journal of Machine Learning Research
, vol.12
, pp. 2825-2830
-
-
Pedregosa, F.1
Varoquaux, G.2
Gramfort, A.3
Michel, V.4
Thirion, B.5
Grisel, O.6
Blondel, M.7
Prettenhofer, P.8
Weiss, R.9
Dubourg, V.10
Vanderplas, J.11
Passos, A.12
Cournapeau, D.13
Brucher, M.14
Perrot, M.15
Duchesnay, E.16
-
24
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
K. Thomas, C. Grier, D. Song, and V. Paxson. Suspended Accounts in Retrospect: an Analysis of Twitter Spam. In Proc. of the 2011 ACM SIGCOMM Conference on Internet Measurement, pages 243-258, 2011.
-
(2011)
Proc. of the 2011 ACM SIGCOMM Conference on Internet Measurement
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
25
-
-
84905664864
-
-
Twitter. Filter API Documentation. https://dev.twitter.com/docs/api/1.1/ post/statuses/filter.
-
Filter API Documentation
-
-
-
26
-
-
84893527887
-
-
Twitter Rules. https://support.twitter.com/articles/18311-the-twitter- rules#.
-
Twitter Rules
-
-
-
27
-
-
85056876224
-
-
Twitter Support. Keeping your account secure. https://support.twitter. com/articles/76036-safety-keeping-your-account-secure#.
-
Keeping Your Account Secure
-
-
-
28
-
-
84905655598
-
-
Twitter Support. My account has been compromised. https://support. twitter.com/articles/31796-my-account-has-been-compromised#.
-
My Account has Been Compromised
-
-
-
31
-
-
84860872656
-
Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter
-
C. Yang, R. C. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing Spammers' Social Networks for Fun and Profit: a Case Study of Cyber Criminal Ecosystem on Twitter. In Proceedings of the 21st International Conference on WWW, pages 71-80, 2012.
-
(2012)
Proceedings of the 21st International Conference on WWW
, pp. 71-80
-
-
Yang, C.1
Harkreader, R.C.2
Zhang, J.3
Shin, S.4
Gu, G.5
-
32
-
-
27144441097
-
An evaluation of statistical approaches to text categorization
-
May
-
Y. Yang. An Evaluation of Statistical Approaches to Text Categorization. Information Retrieval, 1(1-2): 69-90, May 1999.
-
(1999)
Information Retrieval
, vol.1
, Issue.1-2
, pp. 69-90
-
-
Yang, Y.1
|