|
Bokharaei, H. K., Sahraei, A., Ganjali, Y., Keralapura, R., & Nucci, A. (2011). You can SPIT, but you cannot hide: Spammer Identification in Telephony Networks. 2011 Proceedings Ieee Infocom, 41-45. Breiman, L., Friedman, J., Stone, C. J., & Olshen, R. A. (1984). Classification and Regression Trees: Taylor & Francis. Catanese, S., Ferrara, E., & Fiumara, G. (2012). Forensic analysis of phone call networks. Social Network Analysis and Mining, 3(1), 15-33. Chaisamran, N., Okuda, T., Blanc, G., & Yamaguchi, S. (2011). Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships. Coffman, T. R., & Marcus, S. E. (2004). Pattern classification in social network analysis: A case study. Paper presented at the 2004 Ieee Aerospace Conference Proceedings, Vols 1-6. ://WOS:000225274000320 Dev, P., Singh, K., & Dhawan, S. (2015). Classification of malicious and legitimate nodes for analysing the users' behaviour in heterogeneous online social networks. 359-363. Dongwook, S., Jinyoung, A., & Choon, S. (2006). Progressive multi gray-leveling: a voice spam protection algorithm. IEEE Network, 20(5), 18-24. Farseev, A., Nie, L., Akbari, M., & Chua, T.-S. (2015). Harvesting Multiple Sources for User Profile Learning. 235-242. Garton, L., Haythornthwaite, C., & Wellman, B. (1997). Studying Online Social Networks. Journal of Computer-Mediated Communication, 3(1), 0-0. Hawkins, D. M. (2004). The problem of overfitting. J Chem Inf Comput Sci, 44(1), 1-12. Haythornthwaite, C. (1996). Social network analysis: An approach and technique for the study of information exchange. Library & Information Science Research, 18(4), 323-342. Jabeur Ben Chikha, R., Abbes, T., Ben Chikha, W., & Bouhoula, A. (2015). Behavior-based approach to detect spam over IP telephony attacks. International Journal of Information Security, 15(2), 131-143. Kurata, M., Toyoda, K., & Sasase, I. (2015). Two-stage SPIT detection scheme with betweenness centrality and social trust. 289-293. Opsahl, T., Agneessens, F., & Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32(3), 245-251. Rahman, M. M., & Davis, D. N. (2013). Addressing the Class Imbalance Problem in Medical Datasets. International Journal of Machine Learning and Computing, 224-228. Shmueli, G., Patel, N. R., & Bruce, P. C. (2010). Data Mining for Business Intelligence: Concepts, Techniques, and Applications in Microsoft Office Excel with XLMiner: Wiley Publishing. Wang, T., Krim, H., & Viniotis, Y. (2013). A Generalized Markov Graph Model: Application to Social Network Analysis. Paper presented at the IEEE Journal of Selected Topics in Signal Processing. Watts, D. J., Dodds, P. S., & Newman, M. E. (2002). Identity and search in social networks. Science, 296(5571), 1302-1305. Ye, Q., Zhu, T., Hu, D. Y., Wu, B., Du, N., & Wang, B. (2008). Cell Phone Mini Challenge Award: Social Network Accuracy-Exploring Temporal Communication in Mobile Call Graphs. Ieee Symposium on Visual Analytics Science and Technology 2008, Proceedings, 207-208.
|