共 36 条
- [1] Al-Ramahi M., 2020, P 53 HAWAII INT C SY
- [2] Alsmadi I., 2016, Int. Conf. Inf. Syst. Secur. Privacy, V1, P265, DOI [10.5220/0005668302650272, DOI 10.5220/0005668302650272]
- [3] [Anonymous], 2018, FIVETHIRTYEIGHT 0731
- [4] Badawy A, 2018, 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), P258
- [5] Bay M., 2018, 1 MONDAY, V23, DOI DOI 10.5210/FM.V23I11.9388
- [6] Boatwright B. C., 2018, TROLL FACTORIES INTE
- [7] Boshmaf Y, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P93
- [9] Cashmore P., 2009, TWITTER ZOMBIES 24 T
- [10] BotOrNot: A System to Evaluate Social Bots [J]. PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, : 273 - 274