Proceedings of the 26th Annual Computer Security Applications Conference 2010
DOI: 10.1145/1920261.1920263
|View full text |Cite
|
Sign up to set email alerts
|

Detecting spammers on social networks

Abstract: Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, MySpace, or Twitter), storing and sharing a wealth of personal information. This information, as well as the possibility of contacting thousands of users, also attracts the interest of cybercriminals. For example, cybercriminals might exploit the implicit trust relationships between users in order to lure victims to malicious websites.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

2
456
2
7

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 619 publications
(467 citation statements)
references
References 6 publications
2
456
2
7
Order By: Relevance
“…In terms of Twitter, most existing detection work can be classified into two categories. The first category of work, such as [32,22,35,34], mainly utilizes machine learning techniques to classify legitimate accounts and spam accounts according to their collected training data and their selections of classification features. The second category of work, e.g.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…In terms of Twitter, most existing detection work can be classified into two categories. The first category of work, such as [32,22,35,34], mainly utilizes machine learning techniques to classify legitimate accounts and spam accounts according to their collected training data and their selections of classification features. The second category of work, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…[28], detects spam accounts by examining whether the URLs or web domains posted in the tweets are tagged as malicious by the public blacklists. Especially, to collect training data, both [32] and [34] utilize social honey accounts to identify Twitter spammers.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations