共 13 条
[1]
Beutel A., 2013, P 22 INT C WORLD WID, P119, DOI DOI 10.1145/2488388.2488400
[2]
Chavoshi N, 2016, IEEE DATA MINING, P817, DOI [10.1109/ICDM.2016.86, 10.1109/ICDM.2016.0096]
[3]
Chavoshi N, 2016, LECT NOTES COMPUT SC, V10047, P14, DOI 10.1007/978-3-319-47874-6_2
[4]
BotOrNot: A System to Evaluate Social Bots
[J].
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION),
2016,
:273-274
[5]
Ferrara E., 2014, ARXIV 1407 5225
[6]
Ghosh S., 2012, P 21 INT C WORLD WID, P61, DOI DOI 10.1145/2187836.2187846
[7]
Goga O., 2013, EXPLOITING INNOCUOUS, P447
[8]
@spam: The Underground on 140 Characters or Less
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:27-37
[9]
Hamooni Hossein, 2016, Social Informatics. 8th International Conference, SocInfo 2016. Proceedings: LNCS 10046, P58, DOI 10.1007/978-3-319-47880-7_4