共 36 条
[1]
Al-Ramahi M., 2020, P 53 HAWAII INT C SY
[2]
Alsmadi I., 2016, INT C INF SYST SECUR, V1, P265, DOI [10.5220/0005668302650272, DOI 10.5220/0005668302650272]
[3]
[Anonymous], 2018, FIVETHIRTYEIGHT 0731
[4]
Badawy A, 2018, 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), P258
[5]
Bay M., 2018, 1 MONDAY, V23, DOI DOI 10.5210/FM.V23I11.9388
[6]
Boatwright Brandon C, 2018, Troll factories: The internet research agency and state-sponsored agenda building
[7]
Boshmaf Y, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P93
[9]
Cashmore P., 2009, TWITTER ZOMBIES 24 T
[10]
BotOrNot: A System to Evaluate Social Bots
[J].
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION),
2016,
:273-274