2014 International Conference on Recent Trends in Information Technology 2014
DOI: 10.1109/icrtit.2014.6996188
|View full text |Cite
|
Sign up to set email alerts
|

Detecting malicious tweets in trending topics using clustering and classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…In another study done in paper [15] the problem of feature extraction was tried to be solved. For performing this, in this work, initially different features such as user activity features, location based features, content and text features and user pro le features were extracted.…”
Section: Related Workmentioning
confidence: 99%
“…In another study done in paper [15] the problem of feature extraction was tried to be solved. For performing this, in this work, initially different features such as user activity features, location based features, content and text features and user pro le features were extracted.…”
Section: Related Workmentioning
confidence: 99%