-
1
-
-
84861419869
-
Social media and suicide: A public health perspective
-
Mar.
-
D. D. Luxton, J. D. June, and J. M. Fairall, "Social Media and Suicide: A Public Health Perspective," American Journal of Public Health, vol. 102, no. S2, pp. S195-S200, Mar. 2012.
-
(2012)
American Journal of Public Health
, vol.102
, Issue.S2
, pp. S195-S200
-
-
Luxton, D.D.1
June, J.D.2
Fairall, J.M.3
-
2
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
ACM
-
K. Thomas, C. Grier, D. Song, and V. Paxson, "Suspended accounts in retrospect: an analysis of twitter spam," in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011, pp. 243-258.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 243-258
-
-
Thomas, K.1
Grier, C.2
Song, D.3
Paxson, V.4
-
3
-
-
84891736632
-
Twitter spammer detection using data stream clustering
-
Z. Miller, B. Dickinson, W. Deitrick, W. Hu, and A. H. Wang, "Twitter spammer detection using data stream clustering," Information Sciences, vol. 260, pp. 64-73, 2014.
-
(2014)
Information Sciences
, vol.260
, pp. 64-73
-
-
Miller, Z.1
Dickinson, B.2
Deitrick, W.3
Hu, W.4
Wang, A.H.5
-
4
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse
-
Washington, D.C.: USENIX
-
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, "Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse," in Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). Washington, D.C.: USENIX, 2013, pp. 195-210.
-
(2013)
Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13)
, pp. 195-210
-
-
Thomas, K.1
McCoy, D.2
Grier, C.3
Kolcz, A.4
Paxson, V.5
-
6
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
ACM
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, "Spamming botnets: signatures and characteristics," in ACM SIGCOMM Computer Communication Review, vol. 38, no. 4. ACM, 2008, pp. 171-182.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.4
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
7
-
-
85100558628
-
Detecting and tracking political abuse in social media
-
J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, A. Flammini, and F. Menczer, "Detecting and tracking political abuse in social media." in ICWSM, 2011.
-
(2011)
ICWSM
-
-
Ratkiewicz, J.1
Conover, M.2
Meiss, M.3
Gonçalves, B.4
Flammini, A.5
Menczer, F.6
-
8
-
-
84947268733
-
Embassies burning: Toward a near-real-time assessment of social media using geo-temporal dynamic network analytics
-
K. M. Carley, J. Pfeffer, F. Morstatter, and H. Liu, "Embassies burning: toward a near-real-time assessment of social media using geo-temporal dynamic network analytics," Social Network Analysis and Mining, vol. 4, no. 1, pp. 1-23, 2014.
-
(2014)
Social Network Analysis and Mining
, vol.4
, Issue.1
, pp. 1-23
-
-
Carley, K.M.1
Pfeffer, J.2
Morstatter, F.3
Liu, H.4
-
9
-
-
77952876478
-
Robustness of centrality measures under uncertainty: Examining the role of network topology
-
T. L. Frantz, M. Cataldo, and K. M. Carley, "Robustness of centrality measures under uncertainty: Examining the role of network topology," Computational and Mathematical Organization Theory, vol. 15, no. 4, pp. 303-328, 2009.
-
(2009)
Computational and Mathematical Organization Theory
, vol.15
, Issue.4
, pp. 303-328
-
-
Frantz, T.L.1
Cataldo, M.2
Carley, K.M.3
-
10
-
-
32544439820
-
On the robustness of centrality measures under conditions of imperfect data
-
May
-
S. P. Borgatti, K. M. Carley, and D. Krackhardt, "On the robustness of centrality measures under conditions of imperfect data," Social Networks, vol. 28, no. 2, pp. 124-136, May 2006.
-
(2006)
Social Networks
, vol.28
, Issue.2
, pp. 124-136
-
-
Borgatti, S.P.1
Carley, K.M.2
Krackhardt, D.3
-
12
-
-
33750177351
-
Centrality in social networks conceptual clarification
-
L. C. Freeman, "Centrality in social networks conceptual clarification," Social networks, vol. 1, no. 3, pp. 215-239, 1979.
-
(1979)
Social Networks
, vol.1
, Issue.3
, pp. 215-239
-
-
Freeman, L.C.1
-
13
-
-
84899031561
-
A scalable approach to probabilistic latent space inference of large-scale networks
-
J. Yin, Q. Ho, and E. P. Xing, "A scalable approach to probabilistic latent space inference of large-scale networks," in Advances in neural information processing systems, 2013, pp. 422-430.
-
(2013)
Advances in Neural Information Processing Systems
, pp. 422-430
-
-
Yin, J.1
Ho, Q.2
Xing, E.P.3
-
16
-
-
84893748770
-
A topological approach for detecting twitter communities with common interests
-
Springer
-
K. H. Lim and A. Datta, "A Topological Approach for Detecting Twitter Communities with Common Interests," in Ubiquitous Social Media Analysis. Springer, 2013, pp. 23-43.
-
(2013)
Ubiquitous Social Media Analysis
, pp. 23-43
-
-
Lim, K.H.1
Datta, A.2
-
19
-
-
0042421807
-
Statistical fraud detection: A review
-
R. J. Bolton and D. J. Hand, "Statistical fraud detection: A review," Statistical science, pp. 235-249, 2002.
-
(2002)
Statistical Science
, pp. 235-249
-
-
Bolton, R.J.1
Hand, D.J.2
-
21
-
-
77951126973
-
Can you judge a man by his friends?-enhancing spammer detection on the twitter microblogging platform using friends and followers
-
Springer
-
T.-S. Moh and A. J. Murmann, "Can you judge a man by his friends?-enhancing spammer detection on the twitter microblogging platform using friends and followers," in Information Systems, Technology and Management. Springer, 2010, pp. 210-220.
-
(2010)
Information Systems, Technology and Management
, pp. 210-220
-
-
Moh, T.-S.1
Murmann, A.J.2
-
22
-
-
63049112029
-
Latent dirichlet allocation in web spam filtering
-
ACM
-
I. Bíró, J. Szabó, and A. A. Benczúr, "Latent dirichlet allocation in web spam filtering," in Proceedings of the 4th international workshop on Adversarial information retrieval on the web. ACM, 2008, pp. 29-32.
-
(2008)
Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web
, pp. 29-32
-
-
Bíró, I.1
Szabó, J.2
Benczúr, A.A.3
-
23
-
-
84927618942
-
Twitter content-based spam filtering
-
Springer
-
I. Santos, I. Miambres-Marcos, C. Laorden, P. Galn-Garca, A. Santamara-Ibirika, and P. G. Bringas, "Twitter Content-Based Spam Filtering," in International Joint Conference SOCO13-CISIS13-ICEUTE13. Springer, 2014, pp. 449-458.
-
(2014)
International Joint Conference SOCO13-CISIS13-ICEUTE13
, pp. 449-458
-
-
Santos, I.1
Miambres-Marcos, I.2
Laorden, C.3
Galn-Garca, P.4
Santamara-Ibirika, A.5
Bringas, P.G.6
-
24
-
-
84874776051
-
CATS: Characterizing automation of twitter spammers
-
IEEE
-
A. A. Amleshwaram, N. Reddy, S. Yadav, G. Gu, and C. Yang, "CATS: Characterizing automation of Twitter spammers," in Communication Systems and Networks (COMSNETS), 2013 Fifth International Conference on. IEEE, 2013, pp. 1-10.
-
(2013)
Communication Systems and Networks (COMSNETS), 2013 Fifth International Conference On
, pp. 1-10
-
-
Amleshwaram, A.A.1
Reddy, N.2
Yadav, S.3
Gu, G.4
Yang, C.5
-
25
-
-
84865429961
-
Handling weighted, asymmetric, self-looped, and disconnected networks in ora
-
W. Wei, J. Pfeffer, J. Reminga, and K. M. Carley, "Handling weighted, asymmetric, self-looped, and disconnected networks in ora," DTIC Document, Tech. Rep., 2011.
-
(2011)
DTIC Document, Tech. Rep.
-
-
Wei, W.1
Pfeffer, J.2
Reminga, J.3
Carley, K.M.4
-
26
-
-
0141607824
-
Latent dirichlet allocation
-
D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent dirichlet allocation," the Journal of machine Learning research, vol. 3, pp. 993-1022, 2003.
-
(2003)
The Journal of Machine Learning Research
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
28
-
-
84887287030
-
On the precision of social and information networks
-
R. Bosagh Zadeh, A. Goel, K. Munagala, and A. Sharma, "On the precision of social and information networks," in Proceedings of the first ACM conference on Online social networks, 2013, pp. 63-74.
-
(2013)
Proceedings of the First ACM Conference on Online Social Networks
, pp. 63-74
-
-
Bosagh Zadeh, R.1
Goel, A.2
Munagala, K.3
Sharma, A.4
-
29
-
-
84944768684
-
The ISIS twitter census: Defining and describing the population of ISIS supporters on twitter
-
J. Berger and J. Morgan, "The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter," The Brookings Project on U.S. Relations with the Islamic World, vol. 3, no. 20, 2015.
-
(2015)
The Brookings Project on U.S. Relations with the Islamic World
, vol.3
, Issue.20
-
-
Berger, J.1
Morgan, J.2
-
30
-
-
84909334418
-
Chris stevens, us ambassador to Libya, killed in benghazi attack
-
L. Harding and C. Stephen, "Chris stevens, us ambassador to libya, killed in benghazi attack," The Guardian, 2012.
-
(2012)
The Guardian
-
-
Harding, L.1
Stephen, C.2
-
31
-
-
47249142538
-
Scaling regression inputs by dividing by two standard deviations
-
A. Gelman, "Scaling regression inputs by dividing by two standard deviations," Statistics in medicine, vol. 27, no. 15, pp. 2865-2873, 2008.
-
(2008)
Statistics in Medicine
, vol.27
, Issue.15
, pp. 2865-2873
-
-
Gelman, A.1
-
32
-
-
84869235386
-
-
Technical Report, Tech. Rep.
-
C. Fraley, A. E. Raftery, T. B. Murphy, and L. Scrucca, "mclust Version 4 for R: Normal Mixture Modeling for Model-Based Clustering, Classification, and Density Estimation," Technical Report, Tech. Rep., 2012.
-
(2012)
Mclust Version 4 for R: Normal Mixture Modeling for Model-Based Clustering, Classification, and Density Estimation
-
-
Fraley, C.1
Raftery, A.E.2
Murphy, T.B.3
Scrucca, L.4
|