[1] |
FaceBook[EB/OL]. . 2014.
|
[2] |
RenRen[EB/OL]. . 2013.
|
[3] |
MICHAEL F , ROY G , YUVAL E . Online social networks:threates and solutions[J]. IEEE Communications Surveys & Tutorials, 2013,11(4): 1-19.
|
[4] |
WANG A . Don’t follow me:spam detection in twitter[A]. International Conference on Security and Cryptography (SECRYPT)[C]. Athens,Greece, 2010. 142-151.
|
[5] |
HARRIS . A Study of Social Networks Scams Interactive[R]. Public Relations Research, 2008.
|
[6] |
EGELE M , STRINGHINI G , KRUEGEL C . COMPA:detecting compromised account on social networks[A]. Network & Distributed System Security Symposium[C]. San Diego,CA,USA, 2013.
|
[7] |
YANG Z , WILSON C , WANG X . Uncovering social network sybils in the wild[A]. Proceedings of the ACM SIGCOMM Conference on Internet Measurement[C]. Berlin,Germany, 2011. 259-268.
|
[8] |
ZHU Y , WANG X , ZHONG E . Discovering spammers in social networks[A]. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence[C]. Toronto,Canada, 2012. 171-177.
|
[9] |
STRINGHINI G , KRUEGEL C , VIGNA G . Detecting spammers on social networks[A]. Annual Computer Security Applications Conference[C]. Austin,Texas,USA, 2010. 1-9.
|
[10] |
THOMAS K , MCCOY D , GRIER C . Trafficking fraudulent accounts:the role of the underground market in twitter spam and abuse[A]. USENIX Security Conferences[C]. Washington D C,USA, 2013.
|
[11] |
GAO H , HU J , WILSON C . Detecting and characterizing social spam campaigns[A]. Proceedings of the ACM SIGCOMM Conference on Internet Measurement[C]. New York,USA, 2010. 35-47.
|
[12] |
LEE S , KIM J . WARNINGBIRD:detecting suspicious URLs in twitter stream[A]. Network & Distributed System Security Symposium[C]. San Diego,California,USA. 2012.
|
[13] |
THOMAS K , GRIER C , MA J . Design and evaluation of a real-time URL spam filtering service[A]. IEEE Symposium on Security &Privacy[C]. Oakland,California,USA, 2011. 447-462.
|
[14] |
YANG C , HARKREADER R , GU G . Empirical evaluation and new design for fighting evolving twitter spammers[J]. IEEE Transactions on Information Forensics and Security, 2013,8(8): 1280-1293.
|
[15] |
WANG G , KONOLIGE T , WILSON C . You are how you click:clickstream analysis for sybil detection[A]. USENIX Security Conferences[C]. Washington D C,USA, 2013. 241-256.
|
[16] |
YANG C , HARKREADER R , ZHANG J . Analyzing spammer’s social networks for fun and profit[A]. Proceedings of the 21th International Conference on World Wide Web[C]. Lyon,France, 2012. 71-80.
|
[17] |
GRIER C , THOMAS K , PAXSON V , et al. @spam:the underground on 140 characters or less[A]. Proceedings of the 17th ACM Conference on Computer and Communications Security[C]. Chicago,USA, 2010. 27-37.
|
[18] |
LUPHER A , ENGLE C , XIN R . Detecting Spam on Social Networking Sites:Related Work[R]. University of California Berkeley, 2012.
|
[19] |
FLORIAN K , STROHMAIER M . Short links under attack:geographical analysis of spam in a URL shortener network[A]. Proceedings of the 23rd ACM Conference on Hypertext and Social media[C]. Milwaukee,WI,USA, 2012. 83-88.
|
[20] |
Google safe browsing[EB/OL]. . 2014.
|
[21] |
DBL-the spamhaus project[EB/OL]. . 2014.
|
[22] |
Wepawet[EB/OL]. . 2014.
|
[23] |
LEE K , EOFF B , CAVERLEE J . Seven months with the devils:a long-term study of content polluters on twitter[A]. Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media[C]. Barcelona,Spain, 2011. 185-192.
|
[24] |
RenRen privacy statement[EB/OL]. . 2013.
|
[25] |
RenRen search[EB/OL]. . 2013.
|
[26] |
[EB/OL]. , 2014.
|
[27] |
ZHANG J , PORRRAS P , ULLRICH J . Highly predictive blacklisting[A]. USENIX Security Conferences[C]. San Jose,CA,USA, 2008.
|
[28] |
Spam and malware protection[EB/OL]. , 2014.
|
[29] |
THOMAS K , GRIER C , PAXSON V . Suspended accounts in retrospect:an analysis of twitter spam[A]. Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference[C]. Berlin,Germany, 2011. 243-258.
|