Author:
Agrawal Himanshi,Kaushal Rishabh
Reference16 articles.
1. Wang, J., Yu, C.T., Yu, P.S., Liu, B., Meng, W.: Diversionary comments under blog posts. ACM Trans. Web (TWEB) 9(4), 18 (2015)
2. Dewan, P., Kumaraguru, P.: Towards automatic real time identification of malicious posts on Facebook. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST), pp. 85–92. IEEE, 21 July 2015
3. Abu-Nimeh, S., Chen, T.M., Alzubi, O.: Malicious and spam posts in online social networks. Computer 12(9), 23–28 (2011)
4. Metzger, M.J., Flanagin, A.J., Eyal, K., Lemus, D.R., McCann, R.M.: Credibility for the 21st century: integrating perspectives on source, message, and media credibility in the contemporary media environment. Commun. Yearb. 20(27), 293–336 (2003)
5. Nguyen, D.T., Nguyen, N.P., Thai, M.T.: Sources of misinformation in Online Social Networks: who to suspect? In: 2012-MILCOM Military Communications Conference, pp. 1–6. IEEE, 29 October 2012