References
- Sophos Facebook ID Probe. http://www.sophos.com/pressoffice/news/articles/2007/08/facebook.html, 2008.
- D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu, "Reverse social engineering attacks in online social networks," in Detection of Intrusions and Malware, and Vulnerability Assessment, ed: Springer, pp.55-74, 2011.
- Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. Social phishing. Commun. ACM, Vol.50, No.10, pp.94-100, 2007. https://doi.org/10.1145/1290958.1290968
- J. M. Gomez Hidalgo, G. C. Bringas, E. P. Sanz, and F. C. Garcia, "Content based SMS spam filtering," in Proceedings of the 2006 ACM symposium on Document engineering, pp.107-114, 2006.
- G. V. Cormack, J. M. Gomez Hidalgo, and E. P. Sanz, "Spam filtering for short messages," in Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, pp.313-320, 2007.
- Liu JY, Zhao YH, and Zhang ZX et al. "Spam short messages detection via mining social netwoks," JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, Vol.27, No.3, pp.506-514, May, 2012. DOI 10.1007/s11390-012-1239-7
- Richard Bassett et al., "DATA MINING AND SOCIAL NETWORKING SITES: PROTECTING BUSINESS INFRASTRUCTURE AND BEYOND," Issues in Information Systems, Vol.XI, No.1, 2010.
- Mariam Adedoyin-Olowe, Mohamed Medhat Gaber, and Frederic Stahl, "A Survey of Data Mining Techniques for Social Network Analysis," Cornell University.
- Kurt Thomas, Chris Grier, Vern Paxson, and Dawn Song, "Suspended Accounts in Retrospect: An Analysis of Twitter Spam," Internet Measurement Conference(IMC), 2011.
- Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang, "CatchSync : Catching Synchronized Behavior in Large Directed Graphs," KDD '14
- David Easley, Jon Kleinberg, "Networks, Crowds, and Markets: Reasoning About a Highly Connected World," Cambridge University Press.
- Neil Zhenqiang Gong, Mario Frank, and Prateek Mittal, "SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection," IEEE Transactions on Information Forensics and Security, Vol.9, No.6, 2014.
- Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow, "Uncovering Large Groups of Active Malicious Accounts in Online Social Networks," ACM CCS 2014
- Hayoung Oh, Jiyoung Lim, Kijoon Chae and Jungchan Nah, "Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks," Computational Science and Its Application-ICCSA 2006 Lecture Notes in Computer Science, Vol.3983, pp.440-447, 2006.
- Kyoungae Hwang, Hayoung Oh, Jiyoung Lim, Kijoon Chae, and Jungchan Nah, "Traffic Attributes Correlation Mechanism based on Self-Organizing Maps for Real-Time Intrusion Detection," Information Processing Society Journal, Oct., 2005.
Cited by
- Relationship Analysis between Malware and Sybil for Android Apps Recommender System vol.26, pp.5, 2016, https://doi.org/10.13089/JKIISC.2016.26.5.1235