Author:
Lim Jeongwoo,Tamura Masayuki,Nitta Naoko,Nakamura Kazuaki,Babaguchi Noboru
Publisher
Springer Nature Singapore
Reference21 articles.
1. L. Bilge, T. Strufe, D. Balzarotti, E. Kirda, All your contacts are belong to us: automated identity theft attacks on social networks, in The 18th International Conference on World wide web (ACM Press, New York, 2009), pp. 551–560
2. Y. Yao, B. Viswanath, H. Zheng, B.Y. Zhao, Automated crowdturfing attacks and defenses in online review systems, in The 2017 ACM SIGSAC Conference on Computer and Communication Security (ACM press, New York, 2017), pp.1143–1158
3. A. Das, R. Verma, Automated email generation for targeted attacks using natural language (2019). arXiv:1908.06893
4. J. Lim, N. Nitta, K. Nakamura, N. Babaguchi, Generating spoofing tweets considering points of interest of target user, in 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (IEEE Press, Lanzhou, 2019), pp. 1672–1678
5. B. Kollanyi, P.N. Howard, S.C. Woolley, Bots and automation over Twitter during the first US Presidential debate. Comprop. Data Memo. 1–4 (2016)