R. Abascal-mena, R. Lema, and F. Sèdes, Detecting sociosemantic communities by applying social network analysis in tweets, Consulté sur, vol.5, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01283863

N. Agarwal and Y. Yiliyasi, Information quality challenges in social media, International conference on information quality (iciq), 2010.

N. Agarwal and Y. Yiliyasi, Information quality challenges in social media, International conference on information quality (iciq), pp.234-248, 2010.

A. A. Amleshwaram, N. Reddy, S. Yadav, G. Gu, and C. Yang, Cats: Characterizing automation of twitter spammers, Communication systems and networks (comsnets), 2013 fifth international conference on, pp.1-10, 2013.

F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, Detecting spammers on twitter. In In collaboration, electronic messaging, anti-abuse and spam conference (ceas, p.12, 2010.

C. M. Canut, S. On-at, A. Péninou, and F. Sèdes, Time-aware egocentric network-based user profiling, Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining, pp.569-572, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01343052

C. Cao and J. Caverlee, Detecting spam urls in social media via behavioral analysis, European conference on information retrieval, pp.703-714, 2015.

C. Chang and C. Lin, LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, vol.2, p.27, 2011.

Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.6, pp.811-824, 2012.

Z. Chu, I. Widjaja, and H. Wang, Detecting social spam campaigns on twitter, Applied cryptography and network security, pp.455-472, 2012.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The weka data mining software: An update, SIGKDD Explor. Newsl, vol.11, issue.1, pp.10-18, 2009.

J. Juran and A. B. Godfrey, Quality handbook. Republished McGraw-Hill, pp.173-178, 1999.

A. M. Kaplan and M. Haenlein, The early bird catches the news: Nine things you should know about micro-blogging, Business horizons, vol.54, issue.2, pp.105-113, 2011.

S. Kullback, The Kullback-Leibler Distance, The American Statistician, vol.41, issue.4, pp.340-341, 1987.

K. Lee, J. Caverlee, and S. Webb, Uncovering social spammers: Social honeypots + machine learning, Proceedings of the 33rd international acm sigir conference on research and development in information retrieval, pp.435-442, 2010.

C. D. Manning, P. Raghavan, and H. Schütze, Introduction to information retrieval, 2008.

J. Martinez-romo and L. Araujo, Detecting malicious tweets in trending topics using a statistical analysis of language, Expert Systems with Applications, vol.40, issue.8, pp.2992-3000, 2013.

M. Mccord and M. Chuah, Spam detection on twitter using traditional classifiers, International conference on autonomic and trusted computing, pp.175-186, 2011.

M. Mezghani, C. A. Zayani, I. Amous, A. Péninou, and F. Sèdes, Dynamic enrichment of social users' interests, IEEE 8th international conference on research challenges in information science, pp.1-11, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01147325

J. M. Ponte and W. B. Croft, A language modeling approach to information retrieval, Proceedings of the 21st annual international acm sigir conference on research and development in information retrieval, pp.275-281, 1998.

G. Stringhini, C. Kruegel, and G. Vigna, Detecting spammers on social networks, Proceedings of the 26th annual computer security applications conference, pp.1-9, 2010.

. Twitter, The twitter rules, 2016.

Y. Wand and R. Y. Wang, Anchoring data quality dimensions in ontological foundations, Communications of the ACM, vol.39, issue.11, pp.86-95, 1996.

A. H. Wang, Don't follow me: Spam detection in twitter, Security and cryptography (secrypt), proceedings of the 2010 international conference on, pp.1-10, 2010.

C. Yang, R. C. Harkreader, and G. Gu, Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers, Proceedings of the 14th international conference on recent advances in intrusion detection, pp.318-337, 2011.

S. Yardi, D. Romero, G. Schoenebeck, and . Boyd-danah, Detecting spam in a twitter network, First Monday, vol.15, 2009.

A. Zubiaga, M. Liakata, R. Procter, K. Bontcheva, and P. Tolmie, Towards detecting rumours in social media, AAAI workshop, austin, 2015.