1. Akar E (2010) Sosyal medya pazarlaması: Sosyal webde pazarlama stratejileri. Efil Yayınevi
2. Akiyama M, Yagi T, Yada T, Mori T, Kadobayashi Y (2017) Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. Comput Secur 69:155–173
3. Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on Twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), Washington, pp 12–15
4. Bhuyan MH, Bhattacharyya DK, Kalita JK (2012) An effective unsupervised network anomaly detection method. In: Proceedings of the international conference on advances in computing, communications and informatics. ACM, pp 533–539
5. Boshmaf Y, Logothetis D, Siganos G, Lería J, Lorenzo J, Ripeanu M, Beznosov K (2015) Integro: leveraging victim prediction for robust fake account detection in OSNs. NDSS 15:8–11