Twitter bot

Results: 11



#Item
1Stweeler: A Framework for Twitter Bot Analysis Zafar Gilani, Liang Wang, Jon Crowcroft University of Cambridge  {szuhg2, lw525, jac22}

Stweeler: A Framework for Twitter Bot Analysis Zafar Gilani, Liang Wang, Jon Crowcroft University of Cambridge {szuhg2, lw525, jac22}

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:38:21
2Reverse Engineering Socialbot Infiltration Strategies in Twitter Carlos Freitas⇤ , Fabricio Benevenuto⇤ , Saptarshi Ghosh†‡ and Adriano Veloso⇤ † Max  ⇤ Universidade

Reverse Engineering Socialbot Infiltration Strategies in Twitter Carlos Freitas⇤ , Fabricio Benevenuto⇤ , Saptarshi Ghosh†‡ and Adriano Veloso⇤ † Max ⇤ Universidade

Add to Reading List

Source URL: socialnetworks.mpi-sws.org

Language: English - Date: 2015-09-14 09:16:28
3Bot-or-Not: social bot detection Onur Varol, Clayton Davis, Prashant Shiralkar, Emilio Ferrara, Filippo Menczer, and Alessandro Flammini I. Detecting social bots

Bot-or-Not: social bot detection Onur Varol, Clayton Davis, Prashant Shiralkar, Emilio Ferrara, Filippo Menczer, and Alessandro Flammini I. Detecting social bots

Add to Reading List

Source URL: www.clayadavis.net

Language: English - Date: 2016-04-19 18:47:16
4Bot-or-Not: social bot detection Onur Varol, Clayton Davis, Prashant Shiralkar, Emilio Ferrara, Filippo Menczer, and Alessandro Flammini I. Detecting social bots

Bot-or-Not: social bot detection Onur Varol, Clayton Davis, Prashant Shiralkar, Emilio Ferrara, Filippo Menczer, and Alessandro Flammini I. Detecting social bots

Add to Reading List

Source URL: www.clayadavis.net

Language: English - Date: 2016-04-19 18:47:16
5The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks Oana Goga Giridhari Venkatadri

The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks Oana Goga Giridhari Venkatadri

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2015-09-11 04:02:46
6When social bots attack: Modeling susceptibility of users in online social networks Claudia Wagner Silvia Mitter

When social bots attack: Modeling susceptibility of users in online social networks Claudia Wagner Silvia Mitter

Add to Reading List

Source URL: claudiawagner.info

Language: English - Date: 2013-08-25 09:03:44
7

PDF Document

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-10-15 20:13:10
8XX The Rise of Social Bots arXiv:1407.5225v1 [cs.SI] 19 JulEMILIO FERRARA, Indiana University

XX The Rise of Social Bots arXiv:1407.5225v1 [cs.SI] 19 JulEMILIO FERRARA, Indiana University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-07-21 20:34:29
9Computer scientists develop tool for uncovering bot-controlled Twitter accounts

Computer scientists develop tool for uncovering bot-controlled Twitter accounts

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-03-03 07:50:11
106.3 Abuse of Social Media and Political Manipulation  231 Figure 6.19 A scatter plot for 1 week of a potential bot. The state changes of this user were extremely precise—beyond what a human can achieve. Information pos

6.3 Abuse of Social Media and Political Manipulation 231 Figure 6.19 A scatter plot for 1 week of a potential bot. The state changes of this user were extremely precise—beyond what a human can achieve. Information pos

Add to Reading List

Source URL: freebeacon.com

Language: English - Date: 2014-11-10 16:33:19