共 36 条
[1]
[Anonymous], 2010, IMC 2010 P
[2]
Bastian M., ICWSM, Vvol 3, ppp 361, DOI [10.1016/B978-0-12-372180-8.50042-1, DOI 10.1609/ICWSM.V3I1.13937]
[3]
Benevenuto F, 2010, P CEAS JUL
[4]
Detecting Spammers and Content Promoters in Online Video Social Networks
[J].
PROCEEDINGS 32ND ANNUAL INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL,
2009,
:620-627
[5]
Bhat SajidYousuf., 2013, ADV SOCIAL NETWORKS, P100
[7]
Chu Z, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P21
[8]
Dai H, 2012, P C INF KNOWL MAN CI, P1557
[9]
Danezis G, 2009, P NDSS FEBR
[10]
Detecting and Characterizing Social Spam Campaigns
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:681-683