R. Abascal-mena, R. Lema, and F. Sèdes, Detecting sociosemantic communities by applying social network analysis in tweets, Social Network Analysis Mining, vol.5, issue.1, p.17, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01283863

N. Agarwal and Y. Yiliyasi, Information quality challenges in social media, International conference on information quality (ICIQ), pp.234-248, 2010.

A. Almaatouq, E. Shmueli, M. Nouh, A. Alabdulkareem, V. K. Singh et al., If it looks like a spammer and behaves like a spammer, it must be a spammer: Analysis and detection of microblogging spam accounts, International Journal of Information Security, vol.15, issue.5, pp.475-491, 2016.

I. Bara, C. J. Fung, and T. Dinh, Enhancing twitter spam accounts discovery using cross-account pattern mining, Integrated network management (IM), 2015 IFIP/IEEE international symposium on, pp.4-91, 2015.

F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, Detecting spammers on twitter. In In collaboration, electronic messaging, anti-abuse and spam conference (CEAS), p.12, 2010.

C. Cao and J. Caverlee, Detecting spam urls in social media via behavioral analysis, Advances in information retrieval, pp.703-714, 2015.

W. B. Cavnar and J. M. Trenkle, N-gram-based text categorization, Ann Arbor MI, vol.48113, issue.2, pp.161-175, 1994.

A. Chellal, M. Boughanem, and B. Dousset, Multi-criterion real time tweet summarization based upon adaptive threshold, IEEE/WIC/ACM international conference on web intelligence, pp.264-271, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01447220

C. Chen, Y. Wang, J. Zhang, Y. Xiang, W. Zhou et al., Statistical features-based real-time detection of drifted twitter spam, IEEE Transactions on Information Forensics and Security, vol.12, issue.4, pp.914-925, 2017.

C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou, 6 million spam tweets: A large ground truth for timely twitter spam detection, 2015 IEEE international conference on communications (ICC), pp.7065-7070, 2015.

C. Chen, J. Zhang, Y. Xiang, and W. Zhou, Asymmetric self-learning for tackling twitter spam drift, Computer communications workshops (infocom wkshps), pp.208-213, 2015.

C. Chen, J. Zhang, Y. Xiang, W. Zhou, and J. Oliver, Spammers are becoming "smarter" on twitter. IT Professional, vol.18, pp.66-70, 2016.

C. Chen, J. Zhang, Y. Xie, Y. Xiang, W. Zhou et al., A performance evaluation of machine learning-based streaming spam tweets detection, IEEE Transactions on Computational Social Systems, vol.2, issue.3, pp.65-76, 2015.

Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, Who is tweeting on twitter: Human, bot, or cyborg?, Proceedings of the 26th annual computer security applications conference In ACSAC'10, pp.21-30, 2010.

Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.6, pp.811-824, 2012.

Z. Chu, I. Widjaja, and H. Wang, Detecting social spam campaigns on twitter, Applied cryptography and network security, pp.455-472, 2012.

A. Giachanou and F. Crestani, Like it or not: A survey of twitter sentiment analysis methods, ACM Computing Surveys, vol.49, pp.1-41, 2016.

C. Grier, K. Thomas, V. Paxson, and M. Zhang, @spam: The underground on 140 characters or less, Proceedings of the 17th ACM conference on computer and communications security, pp.27-37, 2010.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The weka data mining software: An update, SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.

T. B. Hoang and J. Mothe, Building a knowledge base using microblogs: The case of cultural MicroBlog contextualization collection (regular paper), Conference on multilingual and multimodal information access evaluation (CLEF), pp.1226-1237, 2016.

X. Hu, J. Tang, and H. Liu, Online social spammer detection, AAAI, pp.59-65, 2014.

X. Hu, J. Tang, Y. Zhang, H. ;. Liu, C. Castillo et al., Processing social media messages in mass emergency: A survey, Citeseer. Imran, vol.47, p.38, 2013.

I. Inuwa-dutse, M. Liptrott, and I. Korkontzelos, Detection of spam-posting accounts on twitter, Neurocomputing, p.315, 2018.

A. T. Kabakus and R. Kara, A survey of spam detection methods on twitter, International Journal of Advanced Computer Science and Applications, vol.8, 2017.

S. Kotsiantis and D. Kanellopoulos, Discretization techniques: A recent survey, GESTS International Transactions on Computer Science and Engineering, vol.32, pp.47-58, 2005.

S. Kullback and R. A. Leibler, On information and sufficiency, The Annals of Mathematical Statistics, vol.22, issue.1, pp.79-86, 1951.

K. Lee, J. Caverlee, and S. Webb, Uncovering social spammers: Social honeypots + machine learning, Proceedings of the 33rd international ACM SI-GIR conference on research and development in information retrieval . In SIGIR '10, pp.435-442, 2010.

S. Lee and J. Kim, Warningbird: Detecting suspicious urls in twitter stream, NDSS: 12, pp.1-13, 2012.

S. Lee and J. Kim, Warningbird: A near real-time detection system for suspicious urls in twitter stream, IEEE Transactions on Dependable and Secure Computing, vol.10, issue.3, pp.183-195, 2013.

J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, Learning to detect malicious urls, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2011.

C. D. Manning, P. Raghavan, and H. Schütze, Introduction to information retrieval, 2008.

J. Martinez-romo and L. Araujo, Detecting malicious tweets in trending topics using a statistical analysis of language, Expert Systems with Applications, vol.40, issue.8, 2013.

M. Mccord and M. Chuah, Spam detection on twitter using traditional classifiers, Proceedings of the 8th international conference on autonomic and trusted computing . In ATC'11, pp.175-186, 2011.

C. Meda, E. Ragusa, C. Gianoglio, R. Zunino, A. Ottaviano et al., Spam detection of twitter traffic: A framework based on random forests and non-uniform feature sampling, Advances in social networks analysis and mining (asonam), pp.811-817, 2016.

M. Mezghani, S. On-at, A. Péninou, M. Canut, C. A. Zayani et al., A case study on the influence of the user profile enrichment on buzz propagation in social media: Experiments on delicious, New trends in databases and information systems -ADBIS 2015 short papers and workshops, pp.567-577, 2015.

M. Mezghani, C. A. Zayani, I. Amous, A. Péninou, and F. Sèdes, Dynamic enrichment of social users' interests, IEEE 8th international conference on research challenges in information science, pp.1-11, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01147325

J. Miao and L. Niu, A survey on feature selection, Promoting Business Analytics and Quantitative Management of Technology: 4th International Conference on Information Technology and Quantitative Management, vol.91, pp.919-926, 2016.

A. Mittal, Stock prediction using twitter sentiment analysis, 2011.

A. V. Oppenheim, N. Rout, D. Mishra, and M. K. Mallick, Handling imbalanced data: A survey, International proceedings on advances in soft computing, pp.431-443, 1999.

S. Sedhai and A. Sun, Hspam14: A collection of 14 million tweets for hashtag-oriented spam research, 2015.

S. Sedhai and A. Sun, An analysis of 14 million tweets on hashtag-oriented spamming, Journal of the Association for Information Science and Technology, vol.68, issue.7, pp.1638-1651, 2017.

S. Sedhai and A. Sun, Semi-supervised spam detection in twitter stream, IEEE Transactions on Computational Social Systems, 2017.

G. Stringhini, C. Kruegel, and G. Vigna, Detecting spammers on social networks, Proceedings of the 26th annual computer security applications conference . In ACSAC '10, pp.1-9, 2010.

K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, Design and evaluation of a real-time url spam filtering service, 2011 IEEE symposium on security and privacy, pp.447-462, 2011.

K. Thomas, C. Grier, D. X. Song, and V. Paxson, Suspended accounts in retrospect: An analysis of twitter spam, Internet measurement conference . Twitter, 2011.

A. H. Wang, Don't follow me: Spam detection in twitter, Security and cryptography (secrypt), proceedings of the 2010 international conference on, pp.1-10, 2010.

B. Wang, A. Zubiaga, M. Liakata, and R. Procter, Making the most of tweet--inherent features for social spam detection on twitter, 2015.

D. Wang and C. Pu, Bean: a behavior analysis approach of url spam filtering in twitter, Information reuse and integration (IRI), 2015 IEEE international conference on, pp.403-410, 2015.

M. Washha, A. Qaroush, M. Mezghani, and F. Sèdes, Information quality in social networks: A collaborative method for detecting spam tweets in trending topics, Advances in artificial intelligence: From theory to practice -30th international conference on industrial engineering and other applications of applied intelligent systems, pp.211-223, 2017.

M. Washha, A. Qaroush, M. Mezghani, and F. Sèdes, Information quality in social networks: Predicting spammy naming patterns for retrieving twitter spam accounts, ICEIS 2017 -proceedings of the 19th international conference on enterprise information systems, vol.2, pp.610-622, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01809318

M. Washha, A. Qaroush, and F. Sèdes, Leveraging time for spammers detection on twitter, Proceedings of the 8th international conference on management of digital ecosystems, pp.109-116, 2016.

M. Washha, D. Shilleh, Y. Ghawadrah, R. Jazi, and F. Sèdes, Information quality in online social networks: A fast unsupervised social spam detection method for trending topics, ICEIS 2017 -proceedings of the 19th international conference on enterprise information systems, vol.2, pp.663-675, 2017.

T. Wu, S. Liu, J. Zhang, and Y. Xiang, Twitter spam detection based on deep learning, Proceedings of the Australasian computer science week multiconference, p.3, 2017.

T. Wu, S. Wen, Y. Xiang, and W. Zhou, Twitter spam detection: Survey of new approaches and comparative study. Computers and Security, p.76, 2017.

C. Yang, R. Harkreader, and G. Gu, Empirical evaluation and new design for fighting evolving twitter spammers, IEEE Transactions on Information Forensics and Security, vol.8, issue.8, pp.1280-1293, 2013.

C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu, Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter, Proceedings of the 21st international conference on world wide web . In WWW '12, pp.71-80, 2012.

C. Yang, R. C. Harkreader, and G. Gu, Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers, Proceedings of the 14th international conference on recent advances in intrusion detection . In RAID'11, pp.318-337, 2011.

J. Yang and J. Leskovec, Overlapping community detection at scale: A nonnegative matrix factorization approach, Proceedings of the sixth ACM international conference on web search and data mining, pp.587-596, 2013.

,

A. Zubiaga, D. Spina, E. Amigó, and J. Gonzalo, Towards real-time summarization of scheduled events from twitter streams, 23rd ACM conference on hypertext and social media, HT '12, pp.319-320, 2012.

A. Zubiaga, D. Spina, V. Fresno, and R. Martínez-unanue, Classifying trending topics: A typology of conversation triggers on twitter, Proceedings of the 20th ACM conference on information and knowledge management, CIKM 2011, pp.2461-2464, 2011.