J. S. Alowibdi, U. Buy, P. S. Yu, and L. Stenneth, Detecting deception in Online Social Networks, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp.383-390, 2014.
DOI : 10.1109/ASONAM.2014.6921614

J. Bollen, H. Mao, and X. Zeng, Twitter mood predicts the stock market, Journal of Computational Science, vol.2, issue.1, pp.1-8, 2011.
DOI : 10.1016/j.jocs.2010.12.007

Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, The socialbot network, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.93-102, 2011.
DOI : 10.1145/2076732.2076746

Y. Boshmaf, M. Ripeanu, K. Beznosov, and E. Santos-neto, Thwarting Fake OSN Accounts by Predicting their Victims, Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AISec '15, 2015.
DOI : 10.1145/2808769.2808772

L. Breiman, Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001.
DOI : 10.1023/A:1010933404324

Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, Aiding the detection of fake accounts in large scale social online services, Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12, pp.15-15

C. Castillo, M. Mendoza, and B. Poblete, Information credibility on twitter, Proceedings of the 20th international conference on World wide web, WWW '11, pp.675-684, 2011.
DOI : 10.1145/1963405.1963500

I. Dlala, D. Attiaoui, A. Martin, and B. B. Yaghlane, Trolls Identification within an Uncertain Framework, 2014 IEEE 26th International Conference on Tools with Artificial Intelligence, pp.1011-1015, 2014.
DOI : 10.1109/ICTAI.2014.153

URL : https://hal.archives-ouvertes.fr/hal-01107937

J. R. Douceur, The Sybil Attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

P. Galán-garcía, J. G. De-la-puerta, C. L. Gómez, I. Santos, and P. Bringas, Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying, International Joint Conference SOCO'13-CISIS'13-ICEUTE'13, volume 239 of Advances in Intelligent Systems and Computing, pp.419-428, 2014.

C. Langos, Cyberbullying: The Challenge to Define, Cyberpsychology, Behavior, and Social Networking, vol.15, issue.6, pp.285-289, 2012.
DOI : 10.1089/cyber.2011.0588

P. Mandeep and K. Dhami, Behavioural science support for jtrig's (joint threat research and intelligence group's) effects and online humint operations. Online, 2011.

A. Mislove, A. Post, P. Druschel, and P. K. Gummadi, Ostra: Leveraging trust to thwart unwanted communication, NSDI, pp.15-30, 2008.

F. J. Ortega, Detection of dishonest behaviors in on-line networks using graph-based ranking techniques, AI Communications, vol.26, pp.327-329, 2013.

C. Soghoian, Why google won't protect you from big brother, 2012.

T. Stein, E. Chen, and K. Mangla, Facebook immune system, Proceedings of the 4th Workshop on Social Network Systems, SNS '11, p.8, 2011.
DOI : 10.1145/1989656.1989664

. Techopedia, Definition -what does troll mean

G. X. Toth, Design of a social messaging system using stateful multicast, 2013.

D. N. Tran, B. Min, J. Li, and L. Subramanian, Sybil-resilient online content voting, NSDI, pp.15-28, 2009.

N. Tran, J. Li, L. Subramanian, and S. S. Chow, Optimal Sybil-resilient node admission control, 2011 Proceedings IEEE INFOCOM, pp.3218-3226, 2011.
DOI : 10.1109/INFCOM.2011.5935171

H. Vandebosch and K. Van-cleemput, Defining Cyberbullying: A Qualitative Research into the Perceptions of Youngsters, CyberPsychology & Behavior, vol.11, issue.4, pp.499-503, 2008.
DOI : 10.1089/cpb.2007.0042

T. Vanhove, P. Leroux, W. Tim, and D. T. Filip, Towards the design of a platform for abuse detection in OSNs using multimedial data analysis, IFIP/IEEE IM2013Workshop: 5th InternationalWorkshop onManagement of the Future Internet (ManFI), pp.1195-1198, 2013.

B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove, An analysis of social network-based sybil defenses, Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM '10, pp.363-374, 2010.

H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, Sybillimit: A near-optimal social network defense against sybil attacks, Security and Privacy, pp.3-17, 2008.

H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, SybilGuard, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, pp.267-278, 2006.
DOI : 10.1145/1151659.1159945