-
1
-
-
84860848688
-
Detecting spammers on twitter
-
Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), vol. 6 (2010)
-
(2010)
Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS)
, vol.6
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
2
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
ACM
-
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 551-560. ACM (2009)
-
(2009)
Proceedings of the 18th International Conference on World Wide Web
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
3
-
-
84875854287
-
-
Technical report
-
Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. Technical report (2011), http://www.cs.duke.edu/~qiangcao/publications/sybilrank-tr.pdf
-
(2011)
Aiding the Detection of Fake Accounts in Large Scale Social Online Services
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
4
-
-
78751493674
-
Who is tweeting on twitter: Human, bot, or cyborg?
-
ACM
-
Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 21-30. ACM (2010)
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 21-30
-
-
Chu, Z.1
Gianvecchio, S.2
Wang, H.3
Jajodia, S.4
-
5
-
-
84894273115
-
Kaspersky security bulletin malware evolution 2008
-
April
-
Gostev, A., Zaitsev, O., Golovanov, S., Kamluk, V.: Kaspersky security bulletin malware evolution 2008. Kaspersky Lab (April 2009)
-
(2009)
Kaspersky Lab
-
-
Gostev, A.1
Zaitsev, O.2
Golovanov, S.3
Kamluk, V.4
-
6
-
-
80053125729
-
Deriving knowledge profiles from twitter
-
Kloos, C.D., Gillet, D., Crespo Garca, R.M., Wild, F., Wolpers, M. (eds.) EC-TEL 2011 Springer, Heidelberg
-
Hauff, C., Houben, G.-J.: Deriving knowledge profiles from twitter. In: Kloos, C.D., Gillet, D., Crespo Garca, R.M., Wild, F., Wolpers, M. (eds.) EC-TEL 2011. LNCS, vol. 6964, pp. 139-152. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6964
, pp. 139-152
-
-
Hauff, C.1
Houben, G.-J.2
-
10
-
-
77956971916
-
Understanding the behavior of malicious applications in social networks
-
Makridakis, A., Athanasopoulos, E., Antonatos, S., Antoniades, D., Ioannidis, S., Markatos, E.P.: Understanding the behavior of malicious applications in social networks. IEEE Network 24(5), 14-19 (2010)
-
(2010)
IEEE Network
, vol.24
, Issue.5
, pp. 14-19
-
-
Makridakis, A.1
Athanasopoulos, E.2
Antonatos, S.3
Antoniades, D.4
Ioannidis, S.5
Markatos, E.P.6
-
11
-
-
77950886667
-
You are who you know: Inferring user profiles in online social networks
-
ACM
-
Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, pp. 251-260. ACM (2010)
-
(2010)
Proceedings of the Third ACM International Conference on Web Search and Data Mining
, pp. 251-260
-
-
Mislove, A.1
Viswanath, B.2
Gummadi, K.P.3
Druschel, P.4
-
12
-
-
67650665812
-
Social networks as an attack platform: Facebook case study
-
IEEE
-
Patsakis, C., Asthenidis, A., Chatzidimitriou, A.: Social networks as an attack platform: Facebook case study. In: Eighth International Conference on Networks, ICN 2009, pp. 245-247. IEEE (2009)
-
(2009)
Eighth International Conference on Networks, ICN 2009
, pp. 245-247
-
-
Patsakis, C.1
Asthenidis, A.2
Chatzidimitriou, A.3
-
13
-
-
74049120785
-
Twitterstand: News in tweets
-
ACM
-
Sankaranarayanan, J., Samet, H., Teitler, B.E., Lieberman, M.D., Sperling, J.: Twitterstand: news in tweets. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 42-51. ACM (2009)
-
(2009)
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
, pp. 42-51
-
-
Sankaranarayanan, J.1
Samet, H.2
Teitler, B.E.3
Lieberman, M.D.4
Sperling, J.5
-
14
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
Thomas, K., Grier, C., Paxson, V., Song, D.: Suspended accounts in retrospect: An analysis of twitter spam. In: Proc. of IMC (2011)
-
(2011)
Proc. of IMC
-
-
Thomas, K.1
Grier, C.2
Paxson, V.3
Song, D.4
-
15
-
-
84890668120
-
Predicting elections with twitter:What 140 characters reveal about political sentiment
-
AAAI Press
-
Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Predicting elections with twitter:What 140 characters reveal about political sentiment. In: Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media, pp. 178-185. AAAI Press (2010)
-
(2010)
Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media
, pp. 178-185
-
-
Tumasjan, A.1
Sprenger, T.O.2
Sandner, P.G.3
Welpe, I.M.4
-
16
-
-
84856343452
-
Sentiment analysis of twitter data
-
Apoorv Agarwal Boyi Xie Ilia Vovsha and Owen Rambow Rebecca Passonneau
-
Apoorv Agarwal Boyi Xie Ilia Vovsha and Owen Rambow Rebecca Passonneau. Sentiment analysis of twitter data. In: ACL HLT 2011, p. 30 (2011)
-
(2011)
ACL HLT 2011
, pp. 30
-
-
-
18
-
-
82955161549
-
Uncovering social network sybils in the wild
-
ACM
-
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 259-268. ACM (2011)
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 259-268
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
|