共 135 条
[1]
Abbasi A, 2010, ADV INTEL SOFT COMPU, V76, P49
[2]
Dissecting a Social Botnet: Growth, Content and Influence in Twitter
[J].
PROCEEDINGS OF THE 2015 ACM INTERNATIONAL CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW'15),
2015,
:839-851
[3]
Agarwal N., 2017, DEFENCE STRATEGIC CO, V2, P87, DOI [DOI 10.30966/2018.RIGA.2, DOI 10.30966/2018.RIGA.2.4]
[4]
Examining Botnet Behaviors for Propaganda Dissemination A Case Study of ISIL's Beheading Videos-based Propaganda
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW),
2015,
:51-57
[5]
Al-Khateeb Samer., 2016, Journal on Baltic Security, V2, P6
[6]
Alassad M., 2020, ACC INT C SOC COMP B, P192
[8]
Allem Jon-Patrick, 2017, JMIR Public Health Surveill, V3, pe98, DOI 10.2196/publichealth.8641
[10]
SoK: The Evolution of Sybil Defense via Social Networks
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:382-396