共 52 条
[41]
Stone-Gross B, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P635
[42]
Sutton J., 2008, P INT ISCRAM C MAY
[43]
Thomas K., 2011, P INT MEAS C IMC, P243, DOI DOI 10.1145/2068816.2068840
[44]
Turing A. M., 1950, MIND, VLIX, P433, DOI [10.1093/mind/LIX.236.433, DOI 10.1093/MIND/LIX.236.433, DOI 10.1093/MIND/LIX.236.433.,LIX]
[45]
Tweetadder, 2010, AUT TWITT SOFTW
[46]
Twitter, 2010, TWITT AP WIK
[47]
Xie M., 2007, P 23 ANN COMP SEC AP
[48]
Xie M., 2006, P 13 ACM C COMP COMM
[49]
Yan J., 2006, P 14 INT WORKSH SEC
[50]
Yerazunis B., 2009, CRM114 CONTROLLABLE