메뉴 건너뛰기




Volumn , Issue , 2014, Pages 223-238

Towards detecting anomalous user behavior in online social networks

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; BEHAVIORAL RESEARCH; PRINCIPAL COMPONENT ANALYSIS;

EID: 85029269023     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (243)

References (67)
  • 1
    • 85076285153 scopus 로고    scopus 로고
    • Apache Mahout. http://mahout.apache.org/.
  • 2
    • 85076288449 scopus 로고    scopus 로고
    • Facebook Advertisement Value (BBC). http://www.bbc.co.uk/news/technology-18813237.
  • 3
    • 84893095820 scopus 로고    scopus 로고
    • Copycatch: Stopping group attacks by spotting lockstep behavior in social networks
    • BEUTEL, A., XU, W., GURUSWAMI, V., PALOW, C., and FALOUTSOS, C. Copycatch: Stopping group attacks by spotting lockstep behavior in social networks. In Proc. of WWW (2013).
    • (2013) Proc. Of WWW
    • Beutel, A.1    Xu, W.2    Guruswami, V.3    Palow, C.4    Faloutsos, C.5
  • 6
    • 85076269080 scopus 로고    scopus 로고
    • Click Farms (Washington Post). http://www.washingtonpost.com/blogs/wonkblog/wp/2014/01/06/click-farms-are-the-new-sweatshops.
  • 10
    • 84887050003 scopus 로고    scopus 로고
    • SybilInfer: Detecting sybil nodes using social networks
    • DANEZIS, G., and MITTAL, P. SybilInfer: Detecting Sybil Nodes Using Social Networks. In Proc. of NDSS (2009).
    • (2009) Proc. Of NDSS
    • Danezis, G.1    Mittal, P.2
  • 11
    • 84866484075 scopus 로고    scopus 로고
    • Measuring and fingerprinting click-spam in ad networks
    • DAVE, V., GUHA, S., and ZHANG, Y. Measuring and Fingerprinting Click-Spam in Ad Networks. In Proc. of SIGCOMM (2012).
    • (2012) Proc. Of SIGCOMM
    • Dave, V.1    Guha, S.2    Zhang, Y.3
  • 12
    • 84888989179 scopus 로고    scopus 로고
    • ViceROI: Catching click-spam in search ad networks
    • DAVE, V., GUHA, S., and ZHANG, Y. ViceROI: Catching Click-Spam in Search Ad Networks. In Proc. of CCS (2013).
    • (2013) Proc. Of CCS
    • Dave, V.1    Guha, S.2    Zhang, Y.3
  • 13
    • 84886653855 scopus 로고    scopus 로고
    • A compressed PCA Subspace method for anomaly detection in high-dimensional data
    • DING, Q., and KOLACZYK, E. D. A Compressed PCA Subspace Method for Anomaly Detection in High-Dimensional Data. IEEE Transactions on Information Theory 59, 11 (2013).
    • (2013) IEEE Transactions on Information Theory , vol.59 , pp. 11
    • Ding, Q.1    Kolaczyk, E.D.2
  • 16
    • 85076296472 scopus 로고    scopus 로고
    • Facebook Ads Fake Clicks. http://www.businessinsider.com/mans-600000-facebook-ad-disaster-2014-2.
    • Facebook Ads Fake Clicks
  • 17
    • 85076296121 scopus 로고    scopus 로고
    • Facebook Advertisement Value (Salon). http://www.salon.com/2014/02/14/facebooks_big_like_problem_major_money_and_major_scams/.
  • 24
    • 85076275806 scopus 로고    scopus 로고
    • Facebook COSN Group. https://www.facebook.com/groups/cosn2013.
  • 25
    • 85076302150 scopus 로고    scopus 로고
    • Facebook Directory. https://www.facebook.com/directory/people/.
  • 26
    • 85076295610 scopus 로고    scopus 로고
    • Facebook Graph Search. https://www.facebook.com/about/graphsearch.
  • 29
  • 30
    • 85076301108 scopus 로고    scopus 로고
    • Facebook Page insights. https://www.facebook.com/help/336893449723054.
  • 31
    • 85076316253 scopus 로고    scopus 로고
    • Facebook Quarterly Report (2013). http://investor.fb.com/releasedetail.cfm?ReleaseID=821954.
    • (2013) Facebook Quarterly Report
  • 33
    • 85076275078 scopus 로고    scopus 로고
    • Facebook SIGCOMM Group. https://www.facebook.com/groups/sigcomm/.
  • 34
    • 85076300240 scopus 로고    scopus 로고
    • Facebook Timeline. https://www.facebook.com/about/timeline.
  • 35
    • 85076315196 scopus 로고    scopus 로고
    • Febipos. A Malware. http://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Trojan:JS/Febipos.A.
    • Febipos. A Malware
  • 40
    • 77956044597 scopus 로고    scopus 로고
    • Uncovering social spammers: Social honeypots + Machine learning
    • K. LEE and J. CAVERLEE and AND S. WEBB. Uncovering Social Spammers: Social Honeypots + Machine Learning. In Proc. of SIGIR (2010).
    • (2010) Proc. Of SIGIR
    • Lee, K.1    Caverlee, J.2    Webb, S.3
  • 41
    • 70350647708 scopus 로고    scopus 로고
    • Collaborative filtering with temporal dynamics
    • KOREN, Y. Collaborative filtering with temporal dynamics. In Proc. of KDD (2009).
    • (2009) Proc. Of KDD
    • Koren, Y.1
  • 42
    • 78650709933 scopus 로고    scopus 로고
    • On the leakage of personally identifiable information via online social networks
    • KRISHNAMURTHY, B., and WILLS, C. E. On the Leakage of Personally Identifiable Information via Online Social Networks. ACM SIGCOMM Computer Communications Review 40, 1 (2010).
    • (2010) ACM SIGCOMM Computer Communications Review , vol.40 , pp. 1
    • Krishnamurthy, B.1    Wills, C.E.2
  • 43
    • 85076282850 scopus 로고    scopus 로고
    • L2 Norm. http://mathworld.wolfram.com/L2-Norm.html.
    • L2 Norm
  • 46
    • 84980400461 scopus 로고    scopus 로고
    • Simple and deterministic matrix sketching
    • LIBERTY, E. Simple and Deterministic Matrix Sketching. In Proc. of KDD (2013).
    • (2013) Proc. Of KDD
    • Liberty, E.1
  • 47
    • 85076268914 scopus 로고    scopus 로고
    • Zeus Botnet Cleanup (Microsoft). http://blogs.technet.com/b/microsoft_blog/archive/2014/06/02/microsoft-helps-fbi-in-gameover-zeus-botnet-cleanup.aspx.
    • Zeus Botnet Cleanup (Microsoft)
  • 52
    • 77953317298 scopus 로고    scopus 로고
    • Sybil attacks against mobile users: Friends and foes to the rescue
    • QUERCIA, D., and HAILES, S. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. In Proc. of INFOCOM (2010).
    • (2010) Proc. Of INFOCOM
    • Quercia, D.1    Hailes, S.2
  • 57
    • 34248183970 scopus 로고    scopus 로고
    • Fast principal component analysis using fixed-point algorithm
    • SHARMA, A., and PALIWAL, K. K. Fast Principal Component Analysis Using Fixed-point Algorithm. Journal of Pattern Recognition Letters 28, 10 (2007).
    • (2007) Journal of Pattern Recognition Letters , vol.28 , pp. 10
    • Sharma, A.1    Paliwal, K.K.2
  • 58
    • 84866599022 scopus 로고    scopus 로고
    • Poultry markets: On the underground economy of twitter followers
    • STRINGHINI, G., EGELE, M., KRUEGEL, C., and VIGNA, G. Poultry Markets: On the Underground Economy of Twitter Followers. In Proc. of WOSN (2012).
    • (2012) Proc. Of WOSN
    • Stringhini, G.1    Egele, M.2    Kruegel, C.3    Vigna, G.4
  • 66
    • 45749116664 scopus 로고    scopus 로고
    • Sybil-limit: A near-optimal social network defense against sybil attacks
    • YU, H., and GIBBONS., P. B., KAMINSKY, M., and XIAO, F. Sybil-Limit: A Near-optimal Social Network Defense Against Sybil Attacks. In Proc. of IEEE S & P (2008).
    • (2008) Proc. Of IEEE S & P
    • Yu, H.1    Gibbons, P.B.2    Kaminsky, M.3    Xiao, F.4
  • 67


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.