共 42 条
[1]
Aiello L. M., 2012, P 6 INT AAAI C WEBL, P10
[2]
Ain QT, 2017, INT J ADV COMPUT SC, V8, P424
[3]
Botnet Detection Approach Using Graph-Based Machine Learning
[J].
IEEE ACCESS,
2021, 9 (09)
:99166-99180
[4]
SoK: The Evolution of Sybil Defense via Social Networks
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:382-396
[5]
[Anonymous], 2011, Proceedings of the International AAAI Conference on Web and Social Media, DOI DOI 10.1145/1963192.1963301
[6]
[Anonymous], 2013, P 22 USENIX SEC S WA
[7]
[Anonymous], 2010, First Monday, DOI [DOI 10.5210/FM.V15I1.2793, 10.5210/fm.v15i1.2793]
[8]
Beskow DM, 2018, 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), P825, DOI 10.1109/ASONAM.2018.8508322
[10]
Cai CY, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P128, DOI 10.1109/ISI.2017.8004887