Kabakus et al., 2017
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Kabakus et al. | A survey of spam detection methods on twitter | |
| Ho et al. | Detecting and characterizing lateral phishing at scale | |
| Egele et al. | Towards detecting compromised accounts on social networks | |
| Alani | Big data in cybersecurity: a survey of applications and future trends | |
| Torabi et al. | Detecting Internet abuse by analyzing passive DNS traffic: A survey of implemented systems | |
| Song et al. | Spam filtering in twitter using sender-receiver relationship | |
| Singh et al. | Who is who on twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time | |
| Amleshwaram et al. | Cats: Characterizing automation of twitter spammers | |
| Ahmed et al. | A generic statistical approach for spam detection in online social networks | |
| Çıtlak et al. | A survey on detecting spam accounts on Twitter network | |
| Chen et al. | Feature set identification for detecting suspicious URLs using Bayesian classification in social networks | |
| Alghamdi et al. | Toward detecting malicious links in online social networks through user behavior | |
| Gupta et al. | bit. ly/malicious: Deep dive into short url based e-crime detection | |
| Dewan et al. | Facebook Inspector (FbI): Towards automatic real-time detection of malicious content on Facebook | |
| Dinh et al. | Spam campaign detection, analysis, and investigation | |
| Sahoo et al. | Spammer detection approaches in online social network (OSNs): a survey | |
| Nahapetyan et al. | On sms phishing tactics and infrastructure | |
| Besel et al. | Full cycle analysis of a large-scale botnet attack on twitter | |
| Akinyelu | Machine learning and nature inspired based phishing detection: a literature survey | |
| Das et al. | Analysis of twitter spam detection using machine learning approach | |
| Soman | A survey on behaviors exhibited by spammers in popular social media networks | |
| Binsaeed et al. | Detecting spam in twitter microblogging services: A novel machine learning approach based on domain popularity | |
| Antonakaki et al. | Exploiting abused trending topics to identify spam campaigns in Twitter | |
| Das et al. | How much i can rely on you: Measuring trustworthiness of a Twitter user | |
| Venkatesh et al. | Malicious account detection based on short URLs in twitter |