Author:
Senthil Murugan N.,Usha Devi G.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference37 articles.
1. Zhang, X., Zhu, S., & Liang, W. (2012). Detecting spam and promoting campaigns in the Twitter social network. In 2012 IEEE 12th international conference on data mining. https://doi.org/10.1109/icdm.2012.28 .
2. Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010) Detecting spammer on twitter. Presented at the 7th annual collaboration electronic messaging anti-abuse spam conference, Redmond, WA, USA, Jul. 2010.
3. Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010). @spam. In Proceedings of the 17th ACM conference on Computer and communications security—CCS 10. https://doi.org/10.1145/1866307.1866311 .
4. Yardi, S., Romero, D., Schoenebeck, G., & Boyd, D. (2009). Detecting spam in a Twitter network. First Monday. https://doi.org/10.5210/fm.v15i1.2793 .
5. Bohacik, J., Fuchs, A., & Benedikovic, M. (2017). Detecting compromised accounts on the Pokec online social network. In 2017 international conference on information and digital technologies (IDT). https://doi.org/10.1109/dt.2017.8024272 .
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献