共 25 条
[1]
Ahmed F, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), P265, DOI 10.1109/ICCE.2012.6161859
[2]
Alqatawna J., 2017, Social Media Shaping E-Publishing and Academia, P121, DOI DOI 10.1007/978-3-319-55354-2_10
[3]
[Anonymous], 2018, RSRI C RECENT TRENDS
[4]
[Anonymous], 2014, IJCSIT INT J COMPUTE
[5]
Beutel A., 2013, P 33 INT C WORLD WID, P119
[7]
Malware Propagation in Online Social Networks
[J].
2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009),
2009,
:8-+
[8]
Fei G, 2017, SENTIMENT ANALYSIS IN SOCIAL NETWORKS, P141, DOI 10.1016/B978-0-12-804412-4.00009-7
[9]
@spam: The Underground on 140 Characters or Less
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:27-37
[10]
Gupta H, 2018, INT CONF COMMUN SYST, P380, DOI 10.1109/COMSNETS.2018.8328222