1. Pecchia, A., Sharma, A., Kalbarczyk, Z., Cotroneo, D., Iyer, R.K.: Identifying compromised users in shared computing infrastructures: a data-driven Bayesian network approach. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems. pp. 127–136 (2011)
2. Egele, M., Kruegel, C., Vigna, G.: COMPA?: detecting compromised accounts on social networks. In: 20th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, pp. 1–17 (2013)
3. Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your botnet is my botnet: analysis of a botnet takeover. In: ACM Conference on Computer and Communications Security (2009)
4. Viswanath, B., Muhammad Ahmad, B., Crovella, M., Guha, S., Gummadi, K., Krishnamurthy, B., Mislove, A.: Towards detecting anomalous user behavior in online social networks. In: Proceedings of the 23rd USENIX Security Symposium (USENIX Security), pp. 223–238 (2014)
5. Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network Sybils in the wild. ACM Trans. Knowl. Discov. Data 8, 2:1–2:29 (2014)