Term-weighting approaches in automatic text retrieval
Information Processing and Management: an International Journal
Authoritative sources in a hyperlinked environment
Journal of the ACM (JACM)
X-means: Extending K-means with Efficient Estimation of the Number of Clusters
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Combating spam in tagging systems
AIRWeb '07 Proceedings of the 3rd international workshop on Adversarial information retrieval on the web
Identifying video spammers in online social networks
AIRWeb '08 Proceedings of the 4th international workshop on Adversarial information retrieval on the web
Highly predictive blacklisting
SS'08 Proceedings of the 17th conference on Security symposium
Detecting spammers and content promoters in online video social networks
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
What is Twitter, a social network or a news media?
Proceedings of the 19th international conference on World wide web
Uncovering social spammers: social honeypots + machine learning
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
Unbiased sampling in directed social graph
Proceedings of the ACM SIGCOMM 2010 conference
Outtweeting the twitterers - predicting information cascades in microblogs
WOSN'10 Proceedings of the 3rd conference on Online social networks
@spam: the underground on 140 characters or less
Proceedings of the 17th ACM conference on Computer and communications security
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Detecting spammers on social networks
Proceedings of the 26th Annual Computer Security Applications Conference
Information credibility on twitter
Proceedings of the 20th international conference on World wide web
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Twitter games: how successful spammers pick targets
Proceedings of the 28th Annual Computer Security Applications Conference
Detecting malicious tweets in trending topics using a statistical analysis of language
Expert Systems with Applications: An International Journal
Enhancing and identifying cloning attacks in online social networks
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy
Proceedings of the 22nd international conference on World Wide Web companion
An analysis of socware cascades in online social networks
Proceedings of the 22nd international conference on World Wide Web
SEC'13 Proceedings of the 22nd USENIX conference on Security
Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse
SEC'13 Proceedings of the 22nd USENIX conference on Security
Twitter spammer detection using data stream clustering
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper, we perform an empirical analysis of the cyber criminal ecosystem on Twitter. Essentially, through analyzing inner social relationships in the criminal account community, we find that criminal accounts tend to be socially connected, forming a small-world network. We also find that criminal hubs, sitting in the center of the social graph, are more inclined to follow criminal accounts. Through analyzing outer social relationships between criminal accounts and their social friends outside the criminal account community, we reveal three categories of accounts that have close friendships with criminal accounts. Through these analyses, we provide a novel and effective criminal account inference algorithm by exploiting criminal accounts' social relationships and semantic coordinations.