共 47 条
[2]
Alowibdi JS, 2014, 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014), P383, DOI 10.1109/ASONAM.2014.6921614
[3]
[Anonymous], 2013, USENIX SECURITY, DOI DOI 10.1007/S13278-015-0273-1
[5]
Bhat SY, 2014, COMPUT FRAUD SECUR, P8, DOI 10.1016/S1361-3723(14)70462-2
[6]
Boshmaf Y, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P93
[7]
Camisani-Calzolari M., 2012, ANAL TWITTER FOLOOWE
[8]
Castillo C., 2011, P 20 INT C WORLD WID, P675, DOI 10.1145/1963405.1963500
[9]
Cha M., 2010, Proceedings of the International AAAI Conference on Web and Social Media, V4, P10, DOI [DOI 10.1609/ICWSM.V4I1.14033, 10.1609/icwsm.v4i1.14033]