Author:
Ahmed Faraz,Abulaish Muhammad
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M.: Key challenges in defending against malicious socialbots. In: Proceedings of the 5th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET, vol. 12 (2012)
2. Lecture Notes in Computer Science;S. Nagaraja,2011
3. Thomas, K., Nicol, D.: The koobface botnet and the rise of social malware. In: IEEE 2010 5th International Conference on Malicious and Unwanted Software, MALWARE, pp. 63–70 (2010)
4. Yu, H., Kaminsky, M., Gibbons, P., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Computer Communication Review 36, 267–278 (2006)
5. Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Gossip algorithms: Design, analysis and applications. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2005, vol. 3, pp. 1653–1664. IEEE (2005)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A comprehensive survey on community detection methods and applications in complex information networks;Social Network Analysis and Mining;2024-04-18
2. Detecting Spammer on Micro-blogs Base on Fuzzy Multi-class SVM;2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC);2018-10
3. Fake Profile Identification on Facebook Through SocialMedia App;Information and Communication Technology for Sustainable Development;2017-11-08