共 65 条
- [1] Dissecting a Social Botnet: Growth, Content and Influence in Twitter [J]. PROCEEDINGS OF THE 2015 ACM INTERNATIONAL CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW'15), 2015, : 839 - 851
- [2] Aiello L.M., 2014, Proc. of 6th AAAI Intl. Conf. on Weblogs and Social Media (ICWSM), P10
- [3] [Anonymous], 2010, P 2010 43 HAWAII INT, DOI DOI 10.1353/JSM.2016.0009
- [4] [Anonymous], 2010, P INT AAAI C WEB SOC, DOI [DOI 10.1145/2897659.2897663, DOI 10.1609/ICWSM.V4I1.14033]
- [6] Impromptu Crisis Mapping to Prioritize Emergency Response [J]. COMPUTER, 2016, 49 (05) : 28 - 37
- [7] Bakshy E, 2011, P 4 ACM INT C WEB SE, DOI DOI 10.1145/1935826.1935845
- [8] Beskow DM, 2018, SBP BRIMS 2018 INT
- [9] Bessi A., 2016, 1 MONDAY, V21, DOI [DOI 10.5210/FM.V21I11.709, 10.5210/fm.v21i11.7090, DOI 10.5210/FM.V21I11.7090]