2014
DOI: 10.1016/j.ins.2013.11.016
|View full text |Cite
|
Sign up to set email alerts
|

Twitter spammer detection using data stream clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
160
0
4

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 270 publications
(165 citation statements)
references
References 6 publications
1
160
0
4
Order By: Relevance
“…This presents a number of different challenges since many of the traditional batch learning methods fail when applied to a data stream since we have a number of limitations which are not faced in batch learning [11]. First, because the stream of tweets is potentially unbounded in size, algorithms in this environment have restrictions on memory usage.…”
Section: Twitter Data As a Data Streammentioning
confidence: 99%
“…This presents a number of different challenges since many of the traditional batch learning methods fail when applied to a data stream since we have a number of limitations which are not faced in batch learning [11]. First, because the stream of tweets is potentially unbounded in size, algorithms in this environment have restrictions on memory usage.…”
Section: Twitter Data As a Data Streammentioning
confidence: 99%
“…The number of email correctly classified by Bayesian filter is denoted by 1 . is the number of emails classified incorrectly by Bayesian filter.…”
Section: Comparisons With Other Methods and Accuracy Of The Cpsfsmentioning
confidence: 99%
“…However, the abuse of bulk emails allows spam to spread like a plague. Spam consumes network bandwidth and brings also other threats to recipients: unwanted advertisements and pornographic content, as well as malicious viruses [1]. A spammer does not need to get permissions from recipients when sending spam, which causes serious annoyance to people and even leads to information security risks [2].…”
Section: Introductionmentioning
confidence: 99%
“…With its enormous volume, Twitter also contains messages from automated agents, whose purpose is to advertise, promote or manage perception about specific topics. In academics, spam detection in Twitter is generally seen as a binary classification problem where a tweet is either a spam or not a spam and the spam detection algorithms originate generally from classification methods [34] [35] [36] [37] [38]. Spam detection aims to either identify automated users by using features such as user creation date, username selection and posting patterns or it aims to detect spam tweet by alienating spams based on content [39].…”
Section: Related Workmentioning
confidence: 99%