Detecting sociosemantic communities by applying social network analysis in tweets, Consulté sur, vol.5, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01283863
Information quality challenges in social media, International conference on information quality (iciq), 2010. ,
Information quality challenges in social media, International conference on information quality (iciq), pp.234-248, 2010. ,
Cats: Characterizing automation of twitter spammers, Communication systems and networks (comsnets), 2013 fifth international conference on, pp.1-10, 2013. ,
Detecting spammers on twitter. In In collaboration, electronic messaging, anti-abuse and spam conference (ceas, p.12, 2010. ,
Time-aware egocentric network-based user profiling, Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining, pp.569-572, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01343052
Detecting spam urls in social media via behavioral analysis, European conference on information retrieval, pp.703-714, 2015. ,
LIBSVM: A library for support vector machines, ACM Transactions on Intelligent Systems and Technology, vol.2, p.27, 2011. ,
Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.6, pp.811-824, 2012. ,
Detecting social spam campaigns on twitter, Applied cryptography and network security, pp.455-472, 2012. ,
The weka data mining software: An update, SIGKDD Explor. Newsl, vol.11, issue.1, pp.10-18, 2009. ,
Quality handbook. Republished McGraw-Hill, pp.173-178, 1999. ,
The early bird catches the news: Nine things you should know about micro-blogging, Business horizons, vol.54, issue.2, pp.105-113, 2011. ,
The Kullback-Leibler Distance, The American Statistician, vol.41, issue.4, pp.340-341, 1987. ,
Uncovering social spammers: Social honeypots + machine learning, Proceedings of the 33rd international acm sigir conference on research and development in information retrieval, pp.435-442, 2010. ,
Introduction to information retrieval, 2008. ,
Detecting malicious tweets in trending topics using a statistical analysis of language, Expert Systems with Applications, vol.40, issue.8, pp.2992-3000, 2013. ,
Spam detection on twitter using traditional classifiers, International conference on autonomic and trusted computing, pp.175-186, 2011. ,
Dynamic enrichment of social users' interests, IEEE 8th international conference on research challenges in information science, pp.1-11, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01147325
A language modeling approach to information retrieval, Proceedings of the 21st annual international acm sigir conference on research and development in information retrieval, pp.275-281, 1998. ,
Detecting spammers on social networks, Proceedings of the 26th annual computer security applications conference, pp.1-9, 2010. ,
The twitter rules, 2016. ,
Anchoring data quality dimensions in ontological foundations, Communications of the ACM, vol.39, issue.11, pp.86-95, 1996. ,
Don't follow me: Spam detection in twitter, Security and cryptography (secrypt), proceedings of the 2010 international conference on, pp.1-10, 2010. ,
Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers, Proceedings of the 14th international conference on recent advances in intrusion detection, pp.318-337, 2011. ,
Detecting spam in a twitter network, First Monday, vol.15, 2009. ,
Towards detecting rumours in social media, AAAI workshop, austin, 2015. ,