1. M. Egele, C. Kruegel, and G. Vigna, "COMPA: Detecting Compromised Accounts on Social Networks," in 20th Annual Network & Distributed System Security Symposium, San Diego, CA United States., 2013, pp. 1--17.
2. B. Viswanath, B. Muhammad Ahmad, M. Crovella, S. Guha, K. Gummadi, B. Krishnamurthy, and A. Mislove, "Towards Detecting Anomalous User Behavior in Online Social Networks," in Proceedings of the 23rd USENIX Security Symposium (USENIX Security), 2014, pp. 223--238.
3. K. Singh and M. Cantt, "Outlier Detection: Applications And Techniques," Int. J. Comput. Sci. Issues, vol. 9, no. 1, pp. 307--323, 2012.
4. A. Daneshpazhouh and A. Sami, "Entropy-based outlier detection using semi-supervised approach with few positive examples," Pattern Recognit. Lett., vol. 49, pp. 77--84, 2014.
5. X. Zheng, Z. Zeng, Z. Chen, Y. Yu, and C. Rong, "Detecting spammers on social networks," in Neurocomputing, 2015, vol. 159, pp. 27--34.