Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference 2011
DOI: 10.1145/2030376.2030387
|View full text |Cite
|
Sign up to set email alerts
|

Phi.sh/$oCiaL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…As is expected of a situation where the opponent is adversarial, the parameters of the problem kept changing along the years. Subsequent research addressed new and more complex aspects of abuse on Twitter including popularity inflation, fake followers [9,31], Sybil accounts, bot-created opinion manipulation and political propaganda [32], trends poisoning [20], advertisement [39], phishing and malware dissemination [1,7], and even random acts of sabotage. Evidence of spam evolution can be traced back to the work of Yang et al [35] and several recent studies have independently reached the same result [11,13].…”
Section: Background and Related Work 21 Spam On Twitter And Social Mmentioning
confidence: 99%
“…As is expected of a situation where the opponent is adversarial, the parameters of the problem kept changing along the years. Subsequent research addressed new and more complex aspects of abuse on Twitter including popularity inflation, fake followers [9,31], Sybil accounts, bot-created opinion manipulation and political propaganda [32], trends poisoning [20], advertisement [39], phishing and malware dissemination [1,7], and even random acts of sabotage. Evidence of spam evolution can be traced back to the work of Yang et al [35] and several recent studies have independently reached the same result [11,13].…”
Section: Background and Related Work 21 Spam On Twitter And Social Mmentioning
confidence: 99%
“…As commenting systems on the Social Web have grown in popularity over the past few years, from blogs and social media sites like YouTube and Flickr to major news outlets like NYTimes.com, episodes of abuse online have proliferated …”
Section: Prominent Topics and Approachesmentioning
confidence: 99%
“…A similar campaign has been analyzed by [44], in which spam accounts flood out political messages following the announcement of Russia's parliamentary election results. In addition, classical forms of abuse such as spam and criminal monetization exist in Twitter including phishing scams [15], spreading malware [36], and redirecting victims to reputable websites via affiliate links [45] to generate income.…”
Section: Spam In Social Networkmentioning
confidence: 99%