Author:
Poladi Supraja,Mucha Swetha,Gadipe Sunitha,Prakash R. Vijaya,Kumar G. Mahesh
Reference39 articles.
1. S. K. Decade and A. M. Bagade, 2015, “A review on detecting automation on Twitter accounts,” pp. 69–72.
2. Z. Chu, S. Gianvecchio, 2012, “Detecting automation of twitter accounts: Are you a human, bot, or cyborg,” pp. 811–824.
3. Freitas, F. Benevenuto, 2015, “Reverse engineering social bot infiltration strategies in twitter,” pp. 25–32.
4. S. Jr Barbon, Igawa, R. A., R. Guido, C., 2018, ``Detection of the human, legitimate bot, and malicious bot in online social networks based on wavelets,’’.
5. Y. Zhou et al., 2017, ``ProGuard: Detecting malicious accounts in a social network-based online promotions,’’, pp. 1990_1999.