共 50 条
[12]
Boshmaf Y, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P93
[13]
Chamlertwat W, 2012, J UNIVERS COMPUT SCI, V18, P973
[14]
Investigating the deceptive information in Twitter spam
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2017, 72
:319-326
[15]
Chung J. E., 2011, P NAT C ART INT, V11, P1770
[16]
Conover M. D., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P192, DOI 10.1109/PASSAT/SocialCom.2011.34
[17]
Culnan M. J., 2010, MIS Q EXEC, V9
[19]
Das T, 2014, 2014 INTERNATIONAL CONFERENCE ON ROBOTICS AND EMERGING ALLIED TECHNOLOGIES IN ENGINEERING (ICREATE), P1, DOI 10.1109/iCREATE.2014.6828328