Author:
Liao Cong,Squicciarini Anna,Griffin Christopher,Rajtmajer Sarah
Funder
Army Research Offic
Army Research Office
Air Force Office of Scientific Research
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Human-Computer Interaction,Media Technology,Communication,Information Systems
Reference38 articles.
1. Alchemyapi (2016).
http://www.alchemyapi.com
. Accessed Mar 2016
2. Agichtein E, Castillo C, Donato D, Gionis A, Mishne G (2008) Finding high-quality content in social media. In: Proceedings of the international conference on Web search and web data mining. ACM, pp 183–194
3. Antonio KES, Pinol CMN, Banzon RS (2010) An ising model approach to malware epidemiology.
arXiv:1007.4938
(arXiv preprint)
4. Barbier G, Liu H (2011) Information provenance in social media. In: Social computing, behavioral-cultural modeling and prediction. Springer, New York, pp 276–283
5. Carty SL (2016). Social networking abuse.
http://socialnetworking.lovetoknow.com/Social_Networking_Abuse
. Accessed Mar 2016
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献