Detecting deception in Online Social Networks, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp.383-390, 2014. ,
DOI : 10.1109/ASONAM.2014.6921614
Twitter mood predicts the stock market, Journal of Computational Science, vol.2, issue.1, pp.1-8, 2011. ,
DOI : 10.1016/j.jocs.2010.12.007
The socialbot network, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.93-102, 2011. ,
DOI : 10.1145/2076732.2076746
Thwarting Fake OSN Accounts by Predicting their Victims, Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AISec '15, 2015. ,
DOI : 10.1145/2808769.2808772
Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001. ,
DOI : 10.1023/A:1010933404324
Aiding the detection of fake accounts in large scale social online services, Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12, pp.15-15 ,
Information credibility on twitter, Proceedings of the 20th international conference on World wide web, WWW '11, pp.675-684, 2011. ,
DOI : 10.1145/1963405.1963500
Trolls Identification within an Uncertain Framework, 2014 IEEE 26th International Conference on Tools with Artificial Intelligence, pp.1011-1015, 2014. ,
DOI : 10.1109/ICTAI.2014.153
URL : https://hal.archives-ouvertes.fr/hal-01107937
The Sybil Attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying, International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, volume 239 of Advances in Intelligent Systems and Computing, pp.419-428, 2014. ,
Cyberbullying: The Challenge to Define, Cyberpsychology, Behavior, and Social Networking, vol.15, issue.6, pp.285-289, 2012. ,
DOI : 10.1089/cyber.2011.0588
Behavioural science support for jtrig's (joint threat research and intelligence group's) effects and online humint operations. Online, 2011. ,
Ostra: Leveraging trust to thwart unwanted communication, NSDI, pp.15-30, 2008. ,
Detection of dishonest behaviors in on-line networks using graph-based ranking techniques, AI Communications, vol.26, pp.327-329, 2013. ,
Why google won't protect you from big brother, 2012. ,
Facebook immune system, Proceedings of the 4th Workshop on Social Network Systems, SNS '11, p.8, 2011. ,
DOI : 10.1145/1989656.1989664
Definition -what does troll mean ,
Design of a social messaging system using stateful multicast, 2013. ,
Sybil-resilient online content voting, NSDI, pp.15-28, 2009. ,
Optimal Sybil-resilient node admission control, 2011 Proceedings IEEE INFOCOM, pp.3218-3226, 2011. ,
DOI : 10.1109/INFCOM.2011.5935171
Defining Cyberbullying: A Qualitative Research into the Perceptions of Youngsters, CyberPsychology & Behavior, vol.11, issue.4, pp.499-503, 2008. ,
DOI : 10.1089/cpb.2007.0042
Towards the design of a platform for abuse detection in OSNs using multimedial data analysis, IFIP/IEEE IM2013Workshop: 5th InternationalWorkshop onManagement of the Future Internet (ManFI), pp.1195-1198, 2013. ,
An analysis of social network-based sybil defenses, Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM '10, pp.363-374, 2010. ,
Sybillimit: A near-optimal social network defense against sybil attacks, Security and Privacy, pp.3-17, 2008. ,
SybilGuard, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, pp.267-278, 2006. ,
DOI : 10.1145/1151659.1159945