参考文献
[ 1 ] Kwak H,Lee C, Parket H, et al. What Is Twitter, A
Social Network or a News Media[C] / / Proceedings of
the 19th International Conference on World Wide Web.
New York,USA:ACM Press,2010:591-600.
[ 2 ] 陈 昱,张慧琳. 社会计算在信息安全中的应用[J].
清华大学学报:自然科学版,2011,51(10):1323-1328.
[ 3 ] Zhou Yi,Chen Kai,Song Li,et al. Feature Analysis of
Spammers in Social Networks with Active Honeypots:A
Case Study of Chinese Microblogging Networks [C]/ /
Proceedings of the International Conference on Advances in
Social Networks Analysis and Mining. Washington D. C. , USA:IEEE Press,2012:728-729.
[ 4 ] Yang C,Harkreader R,Zhang J. Analyzing Spammer’s
Social Networks for Fun and Profit[C] / / Proceedings of
the 21th International Conference on World Wide Web.
New York,USA:ACM Press,2012:71-80.
[ 5 ] 丁兆云,周 斌,贾 焰,等. 微博中基于统计特征与
双向投票的垃圾用户发现[J]. 计算机研究与发展,
2013,50(11):2336-2348.
[ 6 ] McCord M,Chuah M. Spam Detection on Twitter Using
Traditional Classifiers [ C ] / / Proceedings of the 8th
International Conference on Autonomic and Trusted
Computing. Piscataway,USA:IEEE Press,2011:175-186.
(下转第59 页)
(上接第54 页)
[ 7 ] Thomas K, Grier C, Paxson V, et al. Suspended
Accounts in Retrospect: An Analysis of Twitter
Spam[C] / / Proceedings of the 11th ACM SIGCOMM
International Conference on Internet Measurement
Conference. New York, USA: ACM Press, 2011:
243-258.
[ 8 ] Bu Zhan,Xia Zhengyou,Wang Jiandong. A SockPuppet
Detection Algorithm on Virtual Spaces[J]. Knowledgebased
Systems,2013,37:366-377.
[ 9 ] Zheng Xueling,Lai Yiu Ming,Chow K P,et al. Sockpuppet
Detection in Online Discussion Forums[C] / /
Proceedings of the 7th International Conference on
Intelligent Information Hiding and Multimedia Signal
Processing. Washington D. C. ,USA:IEEE Press,2011:
374-377.
[10] Chu Zi,Gianvecchio S, Wang Haining, et al. Who Is
Tweeting on Twitter: Human, Bot, or Cyborg [ C ] / /
Proceedings of the 26th Annual Computer Security
Applications Conference. New York,USA:ACM Press,
2010:21-30.
[11] 方 明,方 易. 一种新型智能僵尸粉甄别方法[J].
计算机工程,2013,39(4):190-193,198.
[12] 韩家炜. 数据挖掘:概念与技术[M]. 3 版. 北京:机械
工业出版社,2012.
[13] Hofman J M,Winter A. Who Says What to Whom on
Twitter [ C ] / / Proceedings of the 20th International
Conference on World Wide Web. New York,USA:ACM
Press,2011:705-714.
[14] Hall M,Frank E, Holmes G, et al. The WEKA Data
Mining Software: An Update [ J ]. SIGKDD Explorations,
2009,11(1):10-18.
[15] Tan P,Steinbach M,Kumar V. 数据挖掘导论(完整
版)[M]. 范 明,范宏建,译. 北京:人民邮电出版
社,2011.
编辑 陆燕菲 |