Cited By
View all- Almaatouq AShmueli ENouh MAlabdulkareem ASingh VAlsaleh MAlarifi AAlfaris APentland A(2016)If it looks like a spammer and behaves like a spammer, it must be a spammerInternational Journal of Information Security10.1007/s10207-016-0321-515:5(475-491)Online publication date: 1-Oct-2016
- Almaatouq AAlabdulkareem ANouh MShmueli EAlsaleh MSingh VAlarifi AAlfaris APentland AMenczer FHendler JDutton WStrohmaier MMeyer ECattuto C(2014)TwitterProceedings of the 2014 ACM conference on Web science10.1145/2615569.2615688(33-41)Online publication date: 23-Jun-2014
- Altshuler YFire MShmueli EElovici YBruckstein APentland ALazer D(2013)Detecting anomalous behaviors using structural properties of social networksProceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction10.1007/978-3-642-37210-0_47(433-440)Online publication date: 2-Apr-2013