-
1
-
-
84995438128
-
-
How twitter bots fool you into thinking they are real people. http://www.fastcompany.com/3031500/how-twitter-bots-fool-you-into-thinking//-they-are-real-people
-
-
-
-
2
-
-
84995499008
-
-
Supporting web page containing video, data, code and daily report.http://www.cs.unm.edu/∼chavoshi/debot/
-
-
-
-
3
-
-
78649842272
-
Predicting the future with social media
-
IEEE, Aug
-
Asur, S., Huberman, B.A.: Predicting the future with social media. In: 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, vol. 1, pp. 492-499. IEEE, Aug. 2010
-
(2010)
2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, vol.1
, pp. 492-499
-
-
Asur, S.1
Huberman, B.A.2
-
4
-
-
84893095820
-
Copycatch: Stopping group attacks by spotting lockstep behavior in social networks
-
International World Wide Web Conferences Steering Committee
-
Beutel, A., Xu, W., Guruswami, V., Palow, C., Faloutsos, C.: Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 119-130. International World Wide Web Conferences Steering Committee (2013)
-
(2013)
Proceedings of the 22Nd International Conference on World Wide Web
, pp. 119-130
-
-
Beutel, A.1
Xu, W.2
Guruswami, V.3
Palow, C.4
Faloutsos, C.5
-
6
-
-
84928531591
-
-
arXiv:1407.5225
-
Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. arXiv preprint 2014. arXiv:1407.5225
-
The Rise of Social Bots. Arxiv Preprint 2014
-
-
Ferrara, E.1
Varol, O.2
Davis, C.3
Menczer, F.4
Flammini, A.5
-
7
-
-
84927625528
-
Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying
-
Herrero, ´A., et al. (eds.), Springer, Heidelberg
-
Galán-García, P., de la Puerta, J.G., Gómez, C.L., Santos, I., Bringas, P.G.: Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying. In: Herrero, ´A., et al. (eds.) International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. AISC, vol. 239, pp. 419-428. Springer, Heidelberg (2014)
-
(2014)
International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. AISC
, vol.239
, pp. 419-428
-
-
Galán-García, P.1
De La Puerta, J.G.2
Gómez, C.L.3
Santos, I.4
Bringas, P.G.5
-
8
-
-
84860851065
-
Understanding and combating link farming in the twitter social network
-
ACM Press, New York
-
Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference on World Wide Web-WWW 2012, p. 61. ACM Press, New York, April 2012
-
(2012)
Proceedings of the 21St International Conference on World Wide Web-Www 2012
, pp. 61
-
-
Ghosh, S.1
Viswanath, B.2
Kooti, F.3
Sharma, N.K.4
Korlam, G.5
Benevenuto, F.6
Ganguly, N.7
Gummadi, K.P.8
-
9
-
-
84887308184
-
-
Goga, O., Lei, H., Parthasarathi, S.H.K., Friedland, G., Sommer, R., Teixeira, R.: Exploiting innocuous activity for correlating users across sites, pp. 447-458, May 2013
-
(2013)
Exploiting Innocuous Activity for Correlating Users across Sites
, pp. 447-458
-
-
Goga, O.1
Lei, H.2
Parthasarathi, S.H.K.3
Friedland, G.4
Sommer, R.5
Teixeira, R.6
-
10
-
-
78650005374
-
@spam: The underground on 140 characters or less
-
ACM Press, New York, October
-
Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security-CCS 2010, p. 27. ACM Press, New York, October 2010
-
(2010)
Proceedings of the 17Th ACM Conference on Computer and Communications Security-Ccs 2010
, pp. 27
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
11
-
-
84948436419
-
Understanding sybil groups in the wild
-
Jiang, J., Shan, Z.-F., Wang, X., Zhang, L., Dai, Y.-F.: Understanding sybil groups in the wild. J. Comput. Sci. Technol. 30(6), 1344-1357 (2015)
-
(2015)
J. Comput. Sci. Technol
, vol.30
, Issue.6
, pp. 1344-1357
-
-
Jiang, J.1
Shan, Z.-F.2
Wang, X.3
Zhang, L.4
Dai, Y.-F.5
-
12
-
-
84936947672
-
Detecting campaign promoters on twitter using markov random fields
-
Li, H., Mukherjee, A., Liu, B., Kornfield, R., Emery, S.: Detecting campaign promoters on twitter using markov random fields. In: 2014 IEEE International Conference on Data Mining (ICDM), pp. 290-299 (2014)
-
(2014)
2014 IEEE International Conference on Data Mining (ICDM)
, pp. 290-299
-
-
Li, H.1
Mukherjee, A.2
Liu, B.3
Kornfield, R.4
Emery, S.5
-
13
-
-
84936934872
-
Fast and exact monitoring of co-evolving data streams
-
IEEE, December
-
Matsubara, Y., Sakurai, Y., Ueda, N., Yoshikawa, M.: Fast and exact monitoring of co-evolving data streams. In: 2014 IEEE International Conference on Data Mining, pp. 390-399. IEEE, December 2014
-
(2014)
2014 IEEE International Conference on Data Mining
, pp. 390-399
-
-
Matsubara, Y.1
Sakurai, Y.2
Ueda, N.3
Yoshikawa, M.4
-
14
-
-
84995479808
-
Bot detection in social media: Networks, behavior, and evaluation
-
Morstatter, F., Carley, K.M., Liu, H.: Bot detection in social media: networks, behavior, and evaluation. In: ASONAM-Tutorial, August 2015
-
(2015)
Asonam-Tutorial
-
-
Morstatter, F.1
Carley, K.M.2
Liu, H.3
-
15
-
-
84858020958
-
Correlating financial time series with micro-blogging activity
-
ACM Press, New York
-
Ruiz, E.J., Hristidis, V., Castillo, C., Gionis, A., Jaimes, A.: Correlating financial time series with micro-blogging activity. In: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining-WSDM 2012, p. 513. ACM Press, New York, February 2012
-
(2012)
Proceedings of the Fifth ACM International Conference on Web Search and Data Mining-Wsdm 2012
, pp. 513
-
-
Ruiz, E.J.1
Hristidis, V.2
Castillo, C.3
Gionis, A.4
Jaimes, A.5
-
17
-
-
84976583956
-
The darpa twitter bot challenge
-
(In press)
-
Subrahmanian, V., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Zhu, L., Ferrara, E., Flammini, A., Menczer, F., Waltzman, R., Stevens, A., Dekhtyar, A., Gao, S., Hogg, T., Kooti, F., Liu, Y., Varol, O., Shiralkar, P., Vydiswaran, V., Mei, Q., Huang, T.: The darpa twitter bot challenge. IEEE Comput. 1, 38-46 (2016). (In press)
-
(2016)
IEEE Comput
, vol.1
, pp. 38-46
-
-
Subrahmanian, V.1
Azaria, A.2
Durst, S.3
Kagan, V.4
Galstyan, A.5
Lerman, K.6
Zhu, L.7
Ferrara, E.8
Flammini, A.9
Menczer, F.10
Waltzman, R.11
Stevens, A.12
Dekhtyar, A.13
Gao, S.14
Hogg, T.15
Kooti, F.16
Liu, Y.17
Varol, O.18
Shiralkar, P.19
Vydiswaran, V.20
Mei, Q.21
Huang, T.22
more..
-
18
-
-
84890018962
-
Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse trafficking fraudulent accounts
-
Thomas, K., Paxson, V., Mccoy, D., Grier, C.: Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse trafficking fraudulent accounts. In: USENIX Security Symposium, pp. 195-210 (2013)
-
(2013)
USENIX Security Symposium
, pp. 195-210
-
-
Thomas, K.1
Paxson, V.2
McCoy, D.3
Grier, C.4
-
19
-
-
84995446520
-
-
The Twitter Rules
-
Twitter. The Twitter Rules. https://support.twitter.com/articles/18311
-
-
-
-
20
-
-
77958488685
-
Detecting spam bots in online social networking sites: A machine learning approach
-
Foresti, S., Jajodia, S. (eds.), Springer, Heidelberg
-
Wang, A.H.: Detecting spam bots in online social networking sites: a machine learning approach. In: Foresti, S., Jajodia, S. (eds.) DBSec 2010. LNCS, vol. 6166, pp. 335-342. Springer, Heidelberg (2010). doi:10.1007/978-3-642-13739-6_25
-
(2010)
Dbsec 2010. LNCS
, vol.6166
, pp. 335-342
-
-
Wang, A.H.1
-
21
-
-
79952907127
-
Detecting and analyzing automated activity on twitter
-
Spring, N., Riley, G.F. (eds.), Springer, Heidelberg
-
Zhang, C.M., Paxson, V.: Detecting and analyzing automated activity on twitter. In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 102-111. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19260-9_11
-
(2011)
PAM 2011. LNCS
, vol.6579
, pp. 102-111
-
-
Zhang, C.M.1
Paxson, V.2
|