-
1
-
-
84958156037
-
Dissecting a social botnet: Growth, content, and influence in Twitter
-
ACM
-
Abokhodair, N., Yoo, D. and McDonald, D.W. Dissecting a social botnet: Growth, content, and influence in Twitter. In Proceedings of the 18th ACM Conference on Computer-Supported Cooperative Work and Social Computing (2015). ACM.
-
(2015)
Proceedings of the 18th ACM Conference on Computer-Supported Cooperative Work and Social Computing
-
-
Abokhodair, N.1
Yoo, D.2
McDonald, D.W.3
-
2
-
-
84884537892
-
People are strange when youre a stranger: Impact and influence of bots on social networks
-
AAAI
-
Aiello, L.M., Deplano, M., Schifanella, R. and Ruffo, G. People are strange when youre a stranger: Impact and influence of bots on social networks. In Proceedings of the 6th AAAI International Conference on Weblogs and Social Media (2012). AAAI, 10-17.
-
(2012)
Proceedings of the 6th AAAI International Conference on Weblogs and Social Media
, pp. 10-17
-
-
Aiello, L.M.1
Deplano, M.2
Schifanella, R.3
Ruffo, G.4
-
3
-
-
84881224537
-
Sok: The evolution of sybil defense via social networks
-
IEEE
-
Alvisi, L., Clement, A., Epasto, A., Lattanzi, S. and Panconesi, A. Sok: The evolution of sybil defense via social networks. In Proceedings of the 2013 IEEE Symposium on Security and Privacy. IEEE, 382-396.
-
Proceedings of the 2013 IEEE Symposium on Security and Privacy
, pp. 382-396
-
-
Alvisi, L.1
Clement, A.2
Epasto, A.3
Lattanzi, S.4
Panconesi, A.5
-
4
-
-
84893095820
-
Copy-Catch: Stopping group attacks by spotting lockstep behavior in social networks
-
Beutel, A., Xu, W., Guruswami, V., Palow, C. and Faloutsos, C. Copy-Catch: stopping group attacks by spotting lockstep behavior in social networks. In Proceedings of the 22nd International Conference on World Wide Web (2013), 119-130.
-
(2013)
Proceedings of the 22nd International Conference on World Wide Web
, pp. 119-130
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
5
-
-
79953102821
-
Twitter mood predicts the stock market
-
Bollen, J., Mao, H. and Zeng, X. Twitter mood predicts the stock market. J. Computational Science 2, 1 (2011), 1-8.
-
(2011)
J. Computational Science
, vol.2
, Issue.1
, pp. 1-8
-
-
Bollen, J.1
Mao, H.2
Zeng, X.3
-
6
-
-
85084095251
-
Key challenges in defending against malicious socialbots
-
Boshmaf, Y., Muslukhov, I., Beznosov, K. and Ripeanu, M. Key challenges in defending against malicious socialbots. In Proceedings of the 5th USENIX Conference on Large-scale Exploits and Emergent Threats, Vol. 12 (2012).
-
(2012)
Proceedings of the 5th USENIX Conference on Large-scale Exploits and Emergent Threats
, vol.12
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
7
-
-
84875215273
-
Design and analysis of a social botnet
-
2013
-
Boshmaf, Y., Muslukhov, I., Beznosov, K. and Ripeanu, M. 2013. Design and analysis of a social botnet. Computer Networks 57, 2 (2013), 556-578.
-
(2013)
Computer Networks
, vol.57
, Issue.2
, pp. 556-578
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
9
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Cao, Q., Sirivianos, M., Yang, X. and Pregueiro, T. Aiding the detection of fake accounts in large scale social online services. NSDI (2012). 197-210.
-
(2012)
NSDI
, pp. 197-210
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
10
-
-
84910660900
-
Uncovering large groups of active malicious accounts in online social networks
-
ACM
-
Cao, Q., Yang, X., Yu, J. and Palow, C. Uncovering large groups of active malicious accounts in online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 477-488.
-
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 477-488
-
-
Cao, Q.1
Yang, X.2
Yu, J.3
Palow, C.4
-
11
-
-
84879771223
-
Twitter as a sentinel in emergency situations: Lessons from the Boston marathon explosions
-
July
-
Cassa, C.A., Chunara, R., Mandl, K. and Brownstein, J.S. Twitter as a sentinel in emergency situations: Lessons from the Boston marathon explosions. PLoS Currents: Disasters (July 2013); http://dx.doi.org/10.1371/currents.dis. ad70cd1c8bc585e9470046cde334ee4b
-
(2013)
PLoS Currents: Disasters
-
-
Cassa, C.A.1
Chunara, R.2
Mandl, K.3
Brownstein, J.S.4
-
12
-
-
85126984607
-
Political polarization on Twitter
-
Conover, M., Ratkiewicz, J., Francisco, M., Gonçalves, B., Menczer, F. and Flammini, A. Political polarization on Twitter. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (2011), 89-96.
-
(2011)
Proceedings of the 5th International AAAI Conference on Weblogs and Social Media
, pp. 89-96
-
-
Conover, M.1
Ratkiewicz, J.2
Francisco, M.3
Gonçalves, B.4
Menczer, F.5
Flammini, A.6
-
13
-
-
85125523540
-
BotOrNot: A system to evaluate social bots
-
Forthcoming. Preprint arXiv 1602.00975
-
Davis, C.A., Varol, O., Ferrara, E., Flammini, A. and Menczer, F. BotOrNot: A system to evaluate social bots. In Proceedings of the 25th International World Wide Web Conference Companion (2016); http://dx.doi. org/10.1145/2872518.2889302 Forthcoming. Preprint arXiv:1602.00975.
-
(2016)
Proceedings of the 25th International World Wide Web Conference Companion
-
-
Davis, C.A.1
Varol, O.2
Ferrara, E.3
Flammini, A.4
Menczer, F.5
-
14
-
-
84900620588
-
Is that a bot running the social media feed? Testing the differences in perceptions of communication quality for a human agent and a bot agent on Twitter
-
Edwards, C., Edwards, A., Spence, P.R. and Shelton, A.K. Is that a bot running the social media feed? Testing the differences in perceptions of communication quality for a human agent and a bot agent on Twitter. Computers in Human Behavior 33 (2014), 372-376.
-
(2014)
Computers in Human Behavior
, vol.33
, pp. 372-376
-
-
Edwards, C.1
Edwards, A.2
Spence, P.R.3
Shelton, A.K.4
-
15
-
-
84977112283
-
Ethical considerations when employing fake identities in online social networks for research
-
Elovici, Y., Fire, M., Herzberg, A. and Shulman, H. Ethical considerations when employing fake identities in online social networks for research. Science and Engineering Ethics (2013), 1-17.
-
(2013)
Science and Engineering Ethics
, pp. 1-17
-
-
Elovici, Y.1
Fire, M.2
Herzberg, A.3
Shulman, H.4
-
16
-
-
84893302164
-
Homing socialbots: Intrusion on a specific organizations employee using Socialbots
-
ACM
-
Elyashar, A., Fire, M., Kagan, D. and Elovici, Y. Homing socialbots: Intrusion on a specific organizations employee using Socialbots. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 1358-1365.
-
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
, pp. 1358-1365
-
-
Elyashar, A.1
Fire, M.2
Kagan, D.3
Elovici, Y.4
-
19
-
-
80053345545
-
Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures
-
Golder, S.A. and Macy, M.W. Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures. Science 333, 6051 (2011), 1878-1881.
-
(2011)
Science
, vol.333
, Issue.6051
, pp. 1878-1881
-
-
Golder, S.A.1
Macy, M.W.2
-
20
-
-
84900812811
-
-
IEEE$ 1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter
-
Gupta, A., Lamba, H. and Kumaraguru, P. $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter. eCrime Researchers Summit. IEEE (2013), 1-12.
-
(2013)
ECrime Researchers Summit
, pp. 1-12
-
-
Gupta, A.1
Lamba, H.2
Kumaraguru, P.3
-
21
-
-
36348956237
-
Fighting spam on social web sites: A survey of approaches and future challenges
-
IEEE
-
Heymann, P., Koutrika, G. and Garcia-Molina, H. Fighting spam on social web sites: A survey of approaches and future challenges. Internet Computing 11, 6 (2007). IEEE, 36-45.
-
(2007)
Internet Computing
, vol.11
, Issue.6
, pp. 36-45
-
-
Heymann, P.1
Koutrika, G.2
Garcia-Molina, H.3
-
22
-
-
84863569052
-
Socialbots: Voices from the fronts
-
Hwang, T., Pearce, I. and Nanis, M. Socialbots: Voices from the fronts. ACM Interactions 19, 2 (2012), 38-45.
-
(2012)
ACM Interactions
, vol.19
, Issue.2
, pp. 38-45
-
-
Hwang, T.1
Pearce, I.2
Nanis, M.3
-
24
-
-
85134438433
-
Seven months with the devils: A long-Term study of content polluters on Twitter
-
Lee, K., Eoff, B.D., and Caverlee, J. Seven months with the devils: A long-Term study of content polluters on Twitter. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (2011), 185-192.
-
(2011)
Proceedings of the 5th International AAAI Conference on Weblogs and Social Media
, pp. 185-192
-
-
Lee, K.1
Eoff, B.D.2
Caverlee, J.3
-
25
-
-
84880674077
-
You followed my bot! Transforming robots into influential users in Twitter
-
Messias, J., Schmidt, L., Oliveira, R. and Benevenuto, F. You followed my bot! Transforming robots into influential users in Twitter. First Monday 18, 7 (2013).
-
(2013)
First Monday
, vol.18
, pp. 7
-
-
Messias, J.1
Schmidt, L.2
Oliveira, R.3
Benevenuto, F.4
-
26
-
-
84867809678
-
Social media and the elections
-
Metaxas, P.T. and Mustafaraj, E. Social media and the elections. Science 338, 6106 (2012), 472-473.
-
(2012)
Science
, vol.338
, Issue.6106
, pp. 472-473
-
-
Metaxas, P.T.1
Mustafaraj, E.2
-
27
-
-
84906736685
-
Antireconnaissance tools: Detecting targeted socialbots
-
Paradise, A., Puzis, R. and Shabtai, A. Antireconnaissance tools: Detecting targeted socialbots. Internet Computing 18, 5 (2014), 11-19.
-
(2014)
Internet Computing
, vol.18
, Issue.5
, pp. 11-19
-
-
Paradise, A.1
Puzis, R.2
Shabtai, A.3
-
28
-
-
85100558628
-
Detecting and tracking political abuse in social media
-
Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Flammini, A. and Menczer, F. Detecting and tracking political abuse in social media. In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (2011). 297-304.
-
(2011)
Proceedings of the 5th International AAAI Conference on Weblogs and Social Media
, pp. 297-304
-
-
Ratkiewicz, J.1
Conover, M.2
Meiss, M.3
Gonçalves, B.4
Flammini, A.5
Menczer, F.6
-
29
-
-
79955135282
-
Truthy: Mapping the spread of astroturf in microblog streams
-
Ratkiewicz, J., Conover, M., Meiss, M., Gonçalves, B., Patil, S., Flammini, A. and Menczer, F. Truthy: Mapping the spread of astroturf in microblog streams. In Proceedings of the 20th International Conference on the World Wide Web (2011), 249-252.
-
(2011)
Proceedings of the 20th International Conference on the World Wide Web
, pp. 249-252
-
-
Ratkiewicz, J.1
Conover, M.2
Meiss, M.3
Gonçalves, B.4
Patil, S.5
Flammini, A.6
Menczer, F.7
-
31
-
-
78751502334
-
Detecting spammers on social networks
-
ACM
-
Stringhini, G., Kruegel, C. and Vigna, G. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference (2010), ACM, 1-9.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 1-9
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
32
-
-
84976583956
-
The DARPA twitter bot challenge
-
In press. Preprint arXiv 1601.05140
-
Subrahmanian, VS, Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Zhu, L., Ferrara, E., Flammini, A., Menczer, F. and others. The DARPA Twitter Bot Challenge. IEEE Computer (2016). In press. Preprint arXiv:1601.05140.
-
(2016)
IEEE Computer
-
-
Subrahmanian, V.S.1
Azaria, A.2
Durst, S.3
Kagan, V.4
Galstyan, A.5
Lerman, K.6
Zhu, L.7
Ferrara, E.8
Flammini, A.9
Menczer, F.10
-
33
-
-
0002988210
-
Computing machinery and intelligence
-
Turing, A.M. Computing machinery and intelligence. Mind 49, 236 (1950), 433-460.
-
(1950)
Mind
, vol.49
, Issue.236
, pp. 433-460
-
-
Turing, A.M.1
-
34
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
Viswanath, B., Post, A., Gummadi, K.P. and Mislove, A. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 363-374.
-
(2011)
ACM SIGCOMM Computer Communication Review
, vol.41
, Issue.4
, pp. 363-374
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
35
-
-
84891905950
-
When social bots attack: Modeling susceptibility of users in online social networks
-
Wagner, C., Mitter, S., Körner, S. and Strohmaier, M. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the 21st International Conference on World Wide Web (2012), 41-48.
-
(2012)
Proceedings of the 21st International Conference on World Wide Web
, pp. 41-48
-
-
Wagner, C.1
Mitter, S.2
Körner, S.3
Strohmaier, M.4
-
36
-
-
84891046628
-
Predicting susceptibility to social bots on Twitter
-
IEEE
-
Wald, R., Khoshgoftaar, T.M., Napolitano, A. and Sumner, C. Predicting susceptibility to social bots on Twitter. In Proceedings of the 14th IEEE International Conference on Information Reuse and Integration. IEEE, 6-13.
-
Proceedings of the 14th IEEE International Conference on Information Reuse and Integration
, pp. 6-13
-
-
Wald, R.1
Khoshgoftaar, T.M.2
Napolitano, A.3
Sumner, C.4
-
37
-
-
85076287406
-
You are how you click: Clickstream analysis for sybil detection
-
Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H. and Zhao, B.Y. You are how you click: Clickstream analysis for sybil detection. USENIX Security (2013), 241-256.
-
(2013)
USENIX Security
, pp. 241-256
-
-
Wang, G.1
Konolige, T.2
Wilson, C.3
Wang, X.4
Zheng, H.5
Zhao, B.Y.6
-
38
-
-
84947274737
-
-
NDSS. The Internet Society
-
Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H. and Zhao, B.Y. Social turing tests: Crowdsourcing sybil detection. NDSS. The Internet Society, 2013.
-
(2013)
Social Turing Tests: Crowdsourcing Sybil Detection
-
-
Wang, G.1
Mohanlal, M.2
Wilson, C.3
Wang, X.4
Metzger, M.5
Zheng, H.6
Zhao, B.Y.7
-
39
-
-
84911514327
-
ELIZA-A computer program for the study of natural language communication between man and machine
-
Sept
-
Weizenbaum, J. ELIZA-A computer program for the study of natural language communication between man and machine. Commun. ACM 9, 1 (Sept. 1966), 36-45.
-
(1966)
Commun ACM
, vol.9
, Issue.1
, pp. 36-45
-
-
Weizenbaum, J.1
-
40
-
-
84886482834
-
Detecting marionette microblog users for improved information credibility
-
Springer
-
Wu, X., Feng, Z., Fan, W., Gao, J. and Yu, Y. Detecting marionette microblog users for improved information credibility. Machine Learning and Knowledge Discovery in Databases. Springer, 2013, 483-498.
-
(2013)
Machine Learning and Knowledge Discovery in Databases
, pp. 483-498
-
-
Wu, X.1
Feng, Z.2
Fan, W.3
Gao, J.4
Yu, Y.5
-
41
-
-
84869387230
-
Innocent by association: Early recognition of legitimate users
-
ACM
-
Xie, Y., Yu, F., Ke, Q., Abadi, M., Gillum, E., Vitaldevaria, K., Walter, J., Huang, J. and Mao, Z.M. Innocent by association: Early recognition of legitimate users. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM, 353-364.
-
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 353-364
-
-
Xie, Y.1
Yu, F.2
Ke, Q.3
Abadi, M.4
Gillum, E.5
Vitaldevaria, K.6
Walter, J.7
Huang, J.8
Mao, Z.M.9
-
42
-
-
84896964777
-
Uncovering social network sybils in the wild
-
2014
-
Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y. and Dai, Y. 2014. Uncovering social network sybils in the wild. ACM Trans. Knowledge Discovery from Data 8, 1 (2014), 2.
-
(2014)
ACM Trans. Knowledge Discovery from Data
, vol.8
, Issue.1
, pp. 2
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
|