-
1
-
-
84904515492
-
Twitter: Who gets caught? observed trends in social microblogging spam
-
ACM
-
Almaatouq, A., et al.: Twitter: who gets caught? observed trends in social microblogging spam. In: WebSci, pp. 33–41. ACM (2014)
-
(2014)
Websci
, pp. 33-41
-
-
Almaatouq, A.1
-
2
-
-
84893095820
-
CopyCatch: Stopping group attacks by spotting lockstep behavior in social networks
-
ACM
-
Beutel, A., et al.: CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In: WWW, pp. 119–130. ACM (2013)
-
(2013)
WWW
, pp. 119-130
-
-
Beutel, A.1
-
3
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
Breunig, M., et al.: LOF: identifying density-based local outliers. In: Proc. ACM SIGMOD Conf. 2000, pp. 93–104 (2000)
-
(2000)
Proc. ACM SIGMOD Conf. 2000
, pp. 93-104
-
-
Breunig, M.1
-
5
-
-
34548577504
-
Modeling multiple time series for anomaly detection
-
IEEE Computer Society
-
Chan, P. K., et al.: Modeling multiple time series for anomaly detection. In: ICDM, pp. 90–97. IEEE Computer Society (2005)
-
(2005)
ICDM
, pp. 90-97
-
-
Chan, P.K.1
-
6
-
-
68049121093
-
Anomaly Detection: A Survey
-
Chandola, V., et al.: Anomaly Detection: A Survey. ACM Comput. Surv. 41(3), 15:1–15:58 (2009)
-
(2009)
ACM Comput. Surv
, vol.41
, Issue.3
-
-
Chandola, V.1
-
7
-
-
84866593784
-
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg
-
Chu, Z., et al.: Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE Trans. Dependable Secur. Comput. 9(6), 811–824 (2012)
-
(2012)
IEEE Trans. Dependable Secur. Comput
, vol.9
, Issue.6
, pp. 811-824
-
-
Chu, Z.1
-
8
-
-
84945568506
-
Twitter Deception and Influence: Issues of Identity, Slacktivism, and Puppetry
-
Cook, D., et al.: Twitter Deception and Influence: Issues of Identity, Slacktivism, and Puppetry. Journal of Information Warfare 13(1), 58–71 (2014)
-
(2014)
Journal of Information Warfare
, vol.13
, Issue.1
, pp. 58-71
-
-
Cook, D.1
-
10
-
-
0024476062
-
The Chi-square Plot: A Tool for Multivariate Outlier Recognition
-
Garrett, R.G.: The Chi-square Plot: a Tool for Multivariate Outlier Recognition. Journal of Geochemical Exploration 32, 319–341 (1989)
-
(1989)
Journal of Geochemical Exploration
, vol.32
, pp. 319-341
-
-
Garrett, R.G.1
-
12
-
-
42749086305
-
Fast mining of distance-based outliers in high-dimensional datasets
-
Ghoting, A., et al.: Fast mining of distance-based outliers in high-dimensional datasets. Data Mining and Knowledge Discovery 16(3), 349–364 (2008)
-
(2008)
Data Mining and Knowledge Discovery
, vol.16
, Issue.3
, pp. 349-364
-
-
Ghoting, A.1
-
13
-
-
0033716413
-
Multivariate Gaussian MRF for Multispectral Scene Segmentation and Anomaly Detection
-
Hazel, G.: Multivariate Gaussian MRF for Multispectral Scene Segmentation and Anomaly Detection. IEEE Transactions on Geoscience and Remote Sensing 38(3), 1199–1211 (2000)
-
(2000)
IEEE Transactions on Geoscience and Remote Sensing
, vol.38
, Issue.3
, pp. 1199-1211
-
-
Hazel, G.1
-
14
-
-
13444287831
-
ROBPCA: A New Approach to Robust Principal Component Analysis
-
Hubert, M., et al.: ROBPCA: A New Approach to Robust Principal Component Analysis. Technometrics 47, 64–79 (2005)
-
(2005)
Technometrics
, vol.47
, pp. 64-79
-
-
Hubert, M.1
-
15
-
-
61549100521
-
Robust PCA for Skewed Data and its Outlier Map
-
Hubert, M., et al.: Robust PCA for Skewed Data and its Outlier Map. Computational Statistics & Data Analysis 53(6), 2264–2274 (2009)
-
(2009)
Computational Statistics & Data Analysis
, vol.53
, Issue.6
, pp. 2264-2274
-
-
Hubert, M.1
-
16
-
-
84907030580
-
CatchSync: Catching synchronized behavior in large directed graphs
-
ACM
-
Jiang, M., et al.: CatchSync: catching synchronized behavior in large directed graphs. In: KDD, pp. 941–950. ACM (2014)
-
(2014)
KDD
, pp. 941-950
-
-
Jiang, M.1
-
17
-
-
84901261504
-
Inferring strange behavior from connectivity pattern in social networks
-
In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y. (eds.), Springer, Heidelberg
-
Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Inferring strange behavior from connectivity pattern in social networks. In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y. (eds.) PAKDD 2014, Part I. LNCS, vol. 8443, pp. 126–138. Springer, Heidelberg (2014)
-
(2014)
PAKDD 2014, Part I. LNCS
, vol.8443
, pp. 126-138
-
-
Jiang, M.1
Cui, P.2
Beutel, A.3
Faloutsos, C.4
Yang, S.5
-
19
-
-
12244268431
-
Graph-based anomaly detection
-
Noble, C.C., et al.: Graph-based anomaly detection. In: KDD (2003)
-
(2003)
KDD
-
-
Noble, C.C.1
-
20
-
-
0345359208
-
LOCI: Fast outlier detection using the local correlation integral
-
Papadimitriou, S., et al.: LOCI: Fast outlier detection using the local correlation integral. In: ICDE 2003 (2003)
-
(2003)
ICDE 2003
-
-
Papadimitriou, S.1
-
21
-
-
84936932106
-
Spotting suspicious link behavior with fBox: An adversarial perspective
-
Shah, N., et al.: Spotting suspicious link behavior with fBox: an adversarial perspective. In: ICDM (2014)
-
(2014)
ICDM
-
-
Shah, N.1
-
22
-
-
84890091177
-
Follow the green: Growth and dynamics in twitter follower markets
-
ACM
-
Stringhini, G., et al.: Follow the green: growth and dynamics in twitter follower markets. In: IMC, pp. 163–176. ACM (2013)
-
(2013)
IMC
, pp. 163-176
-
-
Stringhini, G.1
-
23
-
-
84879739780
-
Scaling-Laws of Human Broadcast Communication Enable Distinction between Human, Corporate and Robot Twitter Users
-
Tavares, G., et al.: Scaling-Laws of Human Broadcast Communication Enable Distinction between Human, Corporate and Robot Twitter Users. PLoS ONE 8(7), e65774 (2013)
-
(2013)
Plos ONE
, vol.8
, Issue.7
-
-
Tavares, G.1
-
24
-
-
84936766390
-
-
Twitter Inc. S-1 Filing
-
Twitter Inc. S-1 Filing, US Securities and Exchange Commission (2013). http://www.sec.gov/Archives/edgar/data/1418091/000119312513390321/d564001ds1.htm
-
(2013)
US Securities and Exchange Commission
-
-
-
25
-
-
85162513136
-
Group Anomaly Detection using Flexible Genre Models
-
Xiong, L., et al.: Group Anomaly Detection using Flexible Genre Models. Advances in Neural Information Processing Systems 24, 1071–1079 (2011)
-
(2011)
Advances in Neural Information Processing Systems
, vol.24
, pp. 1071-1079
-
-
Xiong, L.1
-
26
-
-
84894677741
-
Efficient learning on point sets
-
Xiong, L., et al.: Efficient learning on point sets. In: ICDM, pp. 847–856 (2013)
-
(2013)
ICDM
, pp. 847-856
-
-
Xiong, L.1
-
27
-
-
84860872656
-
Analyzing spammers’ social networks for fun and profit: A case study of cyber criminal ecosystem on twitter
-
Yang, C., et al.: Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW, pp. 71–80 (2012)
-
(2012)
WWW
, pp. 71-80
-
-
Yang, C.1
-
28
-
-
84907022448
-
GLAD: Group anomaly detection in social media analysis
-
ACM
-
Yu, R., et al.: GLAD: group anomaly detection in social media analysis. In: KDD, pp. 372–381. ACM (2014)
-
(2014)
KDD
, pp. 372-381
-
-
Yu, R.1
|