Uncovering social spammers: social honeypots + machine learning

作者: Kyumin Lee , James Caverlee , Steve Webb

DOI: 10.1145/1835449.1835522

关键词:

摘要: … on the harvested social honeypot data, we iteratively explore … On the other hand, the bag of words features extracted from “… ); we find that the classification metrics are robust across …

参考文章(27)
James Caverlee, Calton Pu, Steve Webb, Social Honeypots: Making Friends With A Spammer Near You. conference on email and anti-spam. ,(2008)
Lee Holloway, Arthur M. Keller, Matthew B. Prince, Eric Langheinrich, Benjamin M. Dahl, Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot. conference on email and anti-spam. ,(2005)
Mark A. Hall, Ian H. Witten, Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques ,(1999)
Mehran Sahami, Susan Dumais, Eric Horvitz, David Heckerman, A Bayesian Approach to Filtering Junk E-Mail national conference on artificial intelligence. ,(1998)
Christian Kreibich, Jon Crowcroft, Honeycomb: creating intrusion detection signatures using honeypots acm special interest group on data communication. ,vol. 34, pp. 51- 56 ,(2004) , 10.1145/972374.972384
Kenichi YOSHIDA, Fuminori ADACHI, Takashi WASHIO, Hiroshi MOTODA, Teruaki HOMMA, Akihiro NAKASHIMA, Hiromitsu FUJIKAWA, Katsuyuki YAMAZAKI, Density-based spam detector knowledge discovery and data mining. pp. 486- 493 ,(2004) , 10.1145/1014052.1014107
Atif Nazir, Saqib Raza, Chen-Nee Chuah, Unveiling facebook Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference - IMC '08. pp. 43- 56 ,(2008) , 10.1145/1452520.1452527
Fabrício Benevenuto, Tiago Rodrigues, Virgílio Almeida, Jussara Almeida, Marcos Gonçalves, Detecting spammers and content promoters in online video social networks international acm sigir conference on research and development in information retrieval. pp. 620- 627 ,(2009) , 10.1145/1571941.1572047
M.F. Porter, An algorithm for suffix stripping Program: Electronic Library and Information Systems. ,vol. 40, pp. 313- 316 ,(1997) , 10.1108/EB046814