C. Chen, J. Zhang, Y. Xiang, W. Zhou, and J. Oliver, Spammers are becoming" smarter" on twitter, IT professional, vol.18, issue.2, pp.66-70, 2016.

N. Agarwal and Y. Yiliyasi, Information quality challenges in social media, International Conference on Information Quality (ICIQ), pp.234-248, 2010.

M. Washha, A. Qaroush, and F. Sedes, Leveraging time for spammers detection on twitter, Proceedings of the 8th International Conference on Management of Digital EcoSystems, pp.109-116, 2016.

F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, Detecting spammers on twitter, In Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), p.12, 2010.

T. B. Hoang, J. Mothe, K. Balog, L. Cappellato, N. Ferro et al., Building a Knowledge Base using Microblogs: the Case of Cultural MicroBlog Contextualization Collection (regular paper), Conference on Multilingual and Multimodal Information Access Evaluation (CLEF), pp.1226-1237, 2016.

M. Mezghani, S. On-at, A. Péninou, M. Canut, C. A. Zayani et al., A case study on the influence of the user profile enrichment on buzz propagation in social media: Experiments on delicious, New Trends in Databases and Information Systems -ADBIS 2015 Short Papers and Workshops, pp.567-577, 2015.

M. Mezghani, C. A. Zayani, I. Amous, A. Péninou, and F. Sèdes, Dynamic enrichment of social users' interests, IEEE 8th International Conference on Research Challenges in Information Science, pp.1-11, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01147325

R. Abascal-mena, R. Lema, and F. Sèdes,

, Detecting sociosemantic communities by applying social network analysis in tweets, Social Netw Analys Mining, vol.5, issue.1, 2015.

T. Wu, S. Liu, J. Zhang, and Y. Xiang, Twitter spam detection based on deep learning, Proceedings of the Australasian Computer Science Week Multiconference, p.3, 2017.

A. H. Wang,

, Don't follow me: Spam detection in twitter, Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pp.1-10, 2010.

M. Mccord and M. Chuah, Spam detection on twitter using traditional classifiers, Proceedings of the 8th International Conference on Autonomic and Trusted Computing; ATC'11, pp.175-186, 2011.

G. Stringhini, C. Kruegel, and G. Vigna, Detecting spammers on social networks, Proceedings of the 26th Annual Computer Security Applications Conference; ACSAC '10, pp.1-9, 2010.

C. Meda, E. Ragusa, C. Gianoglio, R. Zunino, A. Ottaviano et al., Spam detection of twitter traffic: A framework based on random forests and non-uniform feature sampling, Advances in Social Networks Analysis and Mining (ASONAM), pp.811-817, 2016.

I. A. Bara, C. J. Fung, and T. Dinh, Enhancing twitter spam accounts discovery using cross-account pattern mining, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on, pp.491-496, 2015.

C. Chen, J. Zhang, Y. Xie, Y. Xiang, W. Zhou et al., A performance evaluation of machine learning-based streaming spam tweets detection, IEEE Transactions on Computational Social Systems, vol.2, issue.3, pp.65-76, 2015.

C. Chen, J. Zhang, Y. Xiang, and W. Zhou, Asymmetric self-learning for tackling twitter spam drift, Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference, pp.208-213, 2015.

C. D. Manning, P. Raghavan, and H. Schütze, Introduction to Information Retrieval, p.9780521865715, 2008.

. Twitter, The twitter rules, 2016.

J. Martinez-romo and L. Araujo, Detecting malicious tweets in trending topics using a statistical analysis of language, Expert Systems with Applications, vol.40, issue.8, pp.2992-3000, 2013.

C. Cao and J. Caverlee, Detecting spam urls in social media via behavioral analysis, Advances in Information Retrieval, pp.703-714, 2015.

D. Wang and C. Pu, Bean: a behavior analysis approach of url spam filtering in twitter, Information Reuse and Integration (IRI), 2015 IEEE International Conference on, pp.403-410, 2015.

C. Yang, R. C. Harkreader, and G. Gu, Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers, Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection; RAID'11, pp.318-337, 2011.

C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu, Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter, Proceedings of the 21st International Conference on World Wide Web; WWW '12, pp.71-80, 2012.

A. Almaatouq, E. Shmueli, M. Nouh, A. Alabdulkareem, V. K. Singh et al., If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts, International Journal of Information Security, vol.15, issue.5, pp.475-491, 2016.

Z. Chu, I. Widjaja, and H. Wang, Detecting social spam campaigns on twitter, Applied Cryptography and Network Security, pp.455-472, 2012.

Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.6, pp.811-824, 2012.

X. Hu, J. Tang, and H. Liu, Online social spammer detection, pp.59-65, 2014.

X. Hu, J. Tang, Y. Zhang, and H. Liu, Social spammer detection in microblogging, IJCAI; vol, vol.13, pp.2633-2639, 2013.

K. Lee, J. Caverlee, and S. Webb, Uncovering social spammers: Social honeypots + machine learning, Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval; SIGIR '10, pp.435-442, 2010.

Z. Ghahramani, An introduction to hidden markov models and bayesian networks, International journal of pattern recognition and artificial intelligence, vol.15, issue.01, pp.9-42, 2001.

M. Stamp, A revealing introduction to hidden markov models, 2004.

L. Cam and L. M. , Maximum likelihood: an introduction, 1979.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The weka data mining software: An update, SIGKDD Explor Newsl, vol.11, issue.1, pp.10-18, 2009.