Author:
Padmanabhan Sankar,Maramreddy Prema,Cyriac Marykutty
Reference28 articles.
1. Jin, L., Chen, Y., Wang, T.G., Hui, P., Vasilakos, A.V.: Understanding user behavior in online social networks: A survey. IEEE Commun. Mag. 51(9), 144–150 (2013)
2. Kim, B.I., Im, C.T., Jung, H.C.: Suspicious malicious web site detection with strength analysis of a javascript obfuscation. Int. J. Adv. Sci. Technol. 26, 19–32 (2011)
3. Ma, J., Saul, K.L., Savage, S., Geoffrey, M.V.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245–1254.
https://doi.org/10.1145/1557019.1557153
(2009)
4. Irani, D., Webb, S., Pu, C.: Study of static classification of social spam profiles in myspace. In: Fourth International AAAI Conference on Weblogs and Social Media, May 23–26, pp. 82–89. George Washington University, DC (2010)
5. Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honey pots þ machine learning. In: 33rd Int’l ACM SIGIR Conference Research and Development in Information Retrieval, 978-1-60558-896-4/10/07 (2010)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献