Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3133956.3134055acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

POISED: Spotting Twitter Spam Off the Beaten Paths

Published: 30 October 2017 Publication History

Abstract

Cybercriminals have found in online social networks a propitious medium to spread spam and malicious content. Existing techniques for detecting spam include predicting the trustworthiness of accounts and analyzing the content of these messages. However, advanced attackers can still successfully evade these defenses.
Online social networks bring people who have personal connections or share common interests to form communities. In this paper, we first show that users within a networked community share some topics of interest. Moreover, content shared on these social network tend to propagate according to the interests of people. Dissemination paths may emerge where some communities post similar messages, based on the interests of those communities. Spam and other malicious content, on the other hand, follow different spreading patterns.
In this paper, we follow this insight and present POISED, a system that leverages the differences in propagation between benign and malicious messages on social networks to identify spam and other unwanted content. We test our system on a dataset of 1.3M tweets collected from 64K users, and we show that our approach is effective in detecting malicious messages, reaching 91% precision and 93% recall. We also show that POISED's detection is more comprehensive than previous systems, by comparing it to three state-of-the-art spam detection systems that have been proposed by the research community in the past. POISED significantly outperforms each of these systems. Moreover, through simulations, we show how POISED is effective in the early detection of spam messages and how it is resilient against two well-known adversarial machine learning attacks.

Supplemental Material

MP4 File

References

[1]
Yong-Yeol Ahn, James P Bagrow, and Sune Lehmann. 2010. Link communities reveal multiscale complexity in networks. Nature, Vol. 466, 7307 (2010), 761--764.
[2]
Rodrigo Aldecoa and Ignacio Marín 2013. Exploring the limits of community detection strategies in complex networks. Scientific reports Vol. 3 (2013).
[3]
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida 2010. Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), Vol. Vol. 6. 12.
[4]
Battista Biggio, Igino Corona, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli. 2011. Bagging classifiers for fighting poisoning attacks in adversarial classification tasks International Workshop on Multiple Classifier Systems. Springer, 350--359.
[5]
Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim vSrndić, Pavel Laskov, Giorgio Giacinto, and Fabio Roli. 2013. Evasion attacks against machine learning at test time Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 387--402.
[6]
David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. the Journal of machine Learning research Vol. 3 (2003), 993--1022.
[7]
Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre 2008. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, Vol. 2008, 10 (2008), P10008.
[8]
Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, Jose Lorenzo, Matei Ripeanu, and Konstantin Beznosov. 2015. Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs. NDSS, Vol. Vol. 15. 8--11.
[9]
Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu 2013. Design and analysis of a social botnet. Computer Networks, Vol. 57, 2 (2013), 556--578.
[10]
Ulisses M Braga-Neto and Edward R Dougherty 2004. Is cross-validation valid for small-sample microarray classification? Bioinformatics, Vol. 20, 3 (2004), 374--380.
[11]
Zhuhua Cai and Christopher Jermaine 2012. The latent community model for detecting sybil attacks in social networks Proc. NDSS.
[12]
Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro 2012. Aiding the detection of fake accounts in large scale social online services Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 15--15.
[13]
Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering large groups of active malicious accounts in online social networks Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 477--488.
[14]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Mean Birds: Detecting Aggression and Bullying on Twitter International ACM Web Science Conference (WebSci).
[15]
Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer 2002. SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research Vol. 16 (2002), 321--357.
[16]
Eunjoon Cho, Seth A. Myers, and Jure Leskovec. 2011. Friendship and Mobility: User Movement in Location-based Social Networks Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, New York, NY, USA.
[17]
Ondrej Chum, James Philbin, Andrew Zisserman, et almbox. 2008. Near Duplicate Image Detection: min-Hash and tf-idf Weighting. BMVC, Vol. Vol. 810. 812--815.
[18]
Aaron Clauset, Mark EJ Newman, and Cristopher Moore. 2004. Finding community structure in very large networks. Physical review E, Vol. 70, 6 (2004), 066111.
[19]
B Csákány. 1981. Homogeneity and completeness. In Fundamentals of Computation Theory. Springer, 81--89.
[20]
Mary J Culnan, Patrick J McHugh, and Jesus I Zubillaga. 2010. How large US companies can use Twitter and other social media to gain business value. MIS Quarterly Executive Vol. 9, 4 (2010), 243--259.
[21]
Nilesh Dalvi, Pedro Domingos, Sumit Sanghai, Deepak Verma, et almbox. 2004. Adversarial classification. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 99--108.
[22]
George Danezis and Prateek Mittal 2009. SybilInfer: Detecting Sybil Nodes using Social Networks. NDSS. San Diego, CA.
[23]
Stephen Dann. 2010. Twitter content classification. First Monday, Vol. 15, 12 (2010).
[24]
Abhinandan S Das, Mayur Datar, Ashutosh Garg, and Shyam Rajaram 2007. Google news personalization: scalable online collaborative filtering Proceedings of the 16th international conference on World Wide Web. ACM, 271--280.
[25]
Clayton A Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. BotOrNot: A System to Evaluate Social Bots. arXiv preprint arXiv:1602.00975 (2016).
[26]
Eric Eaton and Rachael Mansbach 2012. A Spin-Glass Model for Semi-Supervised Community Detection. AAAI. Citeseer.
[27]
Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna 2013. COMPA: Detecting Compromised Accounts on Social Networks. NDSS.
[28]
Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna 2015. Towards Detecting Compromised Accounts on Social Networks. Transactions on Dependable and Secure Computing (TDSC) (2015).
[29]
Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2014. The rise of social bots. arXiv preprint arXiv:1407.5225 (2014).
[30]
Chris Fleizach, Geoffrey M Voelker, and Stefan Savage. 2007. Slicing spam with occam's razor. In CEAS.
[31]
Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, and Alok N Choudhary 2012. Towards Online Spam Filtering in Social Networks. NDSS.
[32]
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y Zhao. 2010. Detecting and characterizing social spam campaigns Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM, 35--47.
[33]
Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, Naveen Kumar Sharma, Gautam Korlam, Fabricio Benevenuto, Niloy Ganguly, and Krishna Phani Gummadi 2012. Understanding and combating link farming in the twitter social network Proceedings of the 21st international conference on World Wide Web. ACM, 61--70.
[34]
Amir Globerson and Sam Roweis 2006. Nightmare at Test Time: Robust Learning by Feature Deletion Proceedings of the 23rd International Conference on Machine Learning (ICML '06). ACM, New York, NY, USA.
[35]
Ryan Gomes, Max Welling, and Pietro Perona 2008. Memory bounded inference in topic models. In Proceedings of the 25th international conference on Machine learning. ACM, 344--351.
[36]
Chris Grier, Kurt Thomas, Vern Paxson, and Michael Zhang. 2010. @ spam: the underground on 140 characters or less. Proceedings of the 17th ACM conference on Computer and communications security. ACM, 27--37.
[37]
Liangjie Hong and Brian D Davison 2010. Empirical study of topic modeling in twitter. In Proceedings of the first workshop on social media analytics. ACM, 80--88.
[38]
Tom N Jagatic, Nathaniel A Johnson, Markus Jakobsson, and Filippo Menczer 2007. Social phishing. Commun. ACM Vol. 50, 10 (2007), 94--100.
[39]
Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. 2007. Why we twitter: understanding microblogging usage and communities Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis. ACM, 56--65.
[40]
Chulyun Kim and Kyuseok Shim 2011. Text: Automatic template extraction from heterogeneous web pages. IEEE Transactions on knowledge and data Engineering, Vol. 23, 4 (2011), 612--626.
[41]
Ron Kohavi. 1995. A Study of Cross-validation and Bootstrap for Accuracy Estimation and Model Selection Proceedings of the 14th International Joint Conference on Artificial Intelligence - Volume 2 (IJCAI'95). Morgan Kaufmann Publishers Inc.
[42]
Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010. What is Twitter, a Social Network or a News Media? Proceedings of the 19th International Conference on World Wide Web. ACM.
[43]
Andrea Lancichinetti and Santo Fortunato 2009. Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Physical Review E, Vol. 80, 1 (2009), 016118.
[44]
Andrea Lancichinetti and Santo Fortunato 2009. Community detection algorithms: a comparative analysis. Physical review E, Vol. 80, 5 (2009), 056117.
[45]
A Lancichinetti, MI Sirer, JX Wang, D Acuna, K Körding, and LAN Amaral. 2015. High-reproducibility and high-accuracy method for automated topic classification. Physical Review X Vol. 5 (29 JAN 2015), 011007. https://doi.org/10.1103/PhysRevX.5.011007
[46]
Pavel Laskov and Richard Lippmann 2010. Machine learning in adversarial environments. Machine learning, Vol. 81, 2 (2010), 115--119.
[47]
Sangho Lee and Jong Kim 2012. WarningBird: Detecting Suspicious URLs in Twitter Stream. NDSS.
[48]
Kristina Lerman and Rumi Ghosh 2010. Information contagion: An empirical study of the spread of news on Digg and Twitter social networks. ICWSM Vol. 10 (2010), 90--97.
[49]
Kwan Hui Lim and Amitava Datta 2012. Finding twitter communities with common interests using following links of celebrities Proceedings of the 3rd international workshop on Modeling social media. ACM, 25--32.
[50]
Changchang Liu, Peng Gao, Matthew Wright, and Prateek Mittal. 2015. Exploiting Temporal Dynamics in Sybil Defenses. In ACM SIGSAC Conference on Computer and Communications Security (CCS).
[51]
Linqing Liu, Yao Lu, Ye Luo, Renxian Zhang, Laurent Itti, and Jianwei Lu. 2016. "Detecting Smart" Spammers On Social Network: A Topic Model Approach. arXiv preprint arXiv:1604.08504 (2016).
[52]
Daniel Lowd and Christopher Meek 2005. Adversarial learning Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining. ACM, 641--647.
[53]
Andrew K McCallum. 2002. MALLET: A Machine Learning for Language Toolkit$$. http://mallet.cs.umass.edu/. (2002).
[54]
Miller McPherson, Lynn Smith-Lovin, and James M Cook. 2001. Birds of a feather: Homophily in social networks. Annual review of sociology (2001), 415--444.
[55]
Ghita Mezzour and Kathleen M Carley 2014. Spam diffusion in a social network initiated by hacked e-mail accounts. International Journal of Security and Networks, Vol. 9, 3 (2014), 144--153.
[56]
Peter J Mucha, Thomas Richardson, Kevin Macon, Mason A Porter, and Jukka-Pekka Onnela 2010. Community structure in time-dependent, multiscale, and multiplex networks. science, Vol. 328, 5980 (2010), 876--878.
[57]
Ramesh Nallapati, William Cohen, and John Lafferty. 2007. Parallelized variational EM for latent Dirichlet allocation: An experimental evaluation of speed and scalability. In Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007). IEEE, 349--354.
[58]
Blaine Nelson, Marco Barreno, Fuching Jack Chi, Anthony D. Joseph, Benjamin I. P. Rubinstein, Udam Saini, Charles Sutton, J. D. Tygar, and Kai Xia 2008. Exploiting Machine Learning to Subvert Your Spam Filter Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET'08). USENIX Association, Berkeley, CA, USA.
[59]
Azadeh Nematzadeh, Emilio Ferrara, Alessandro Flammini, and Yong-Yeol Ahn 2014. Optimal network modularity for information diffusion. Physical review letters Vol. 113, 8 (2014), 088701.
[60]
Mark EJ Newman. 2006. Modularity and community structure in networks. Proceedings of the National Academy of Sciences, Vol. 103, 23 (2006), 8577--8582.
[61]
Mark EJ Newman and Juyong Park 2003. Why social networks are different from other types of networks. Physical Review E, Vol. 68, 3 (2003), 036122.
[62]
Gergely Palla, Imre Derényi, Illés Farkas, and Tamás Vicsek 2005. Uncovering the overlapping community structure of complex networks in nature and society. Nature, Vol. 435, 7043 (June 2005), 814--818. .acm.org/citation.cfm?id=2831143.2831209
[63]
Stephen B Seidman. 1983. Network structure and minimum degree. Social networks, Vol. 5, 3 (1983), 269--287.
[64]
Padhraic Smyth, Max Welling, and Arthur U Asuncion. 2009. Asynchronous distributed learning of topic models. Advances in Neural Information Processing Systems. 81--88.
[65]
G. Stringhini, M. Egele, C. Kruegel, and G. Vigna. 2012. Poultry Markets: On the Underground Economy of Twitter Followers Proceedings of the Workshop on Online Social Network (WOSN). ACM, Helsinki, Finland.
[66]
Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna 2010. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 1--9.
[67]
Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna 2015. Evilcohort: detecting communities of malicious accounts on online services USENIX Security Symposium.
[68]
Jessica Su and Sen Wu. 2013. Null Models For Social Networks. http://snap.stanford.edu/class/cs224w-2013/projects2013/cs224w-003-final.pdf. (2013).
[69]
Chenhao Tan, Lillian Lee, and Bo Pang 2014. The effect of wording on message propagation: Topic-and author-controlled natural experiments on Twitter. arXiv preprint arXiv:1405.1438 (2014).
[70]
Lei Tang and Huan Liu. 2010. Community detection and mining in social media. Synthesis Lectures on Data Mining and Knowledge Discovery, Vol. 2, 1 (2010).
[71]
Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song 2011. Design and evaluation of a real-time url spam filtering service Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, 447--462.
[72]
Kurt Thomas, Chris Grier, Dawn Song, and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 243--258.
[73]
Oren Tsur, Adi Littman, and Ari Rappoport 2013. Efficient Clustering of Short Messages into General Domains. ICWSM. Citeseer.
[74]
Twitter 2009. Reporting spam on Twitter. https://support.twitter.com/articles/64986. (2009).
[75]
Twitter 2015. Twitter usage. https://about.twitter.com/company. (2015).
[76]
Bimal Viswanath, Muhammad Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P Gummadi, Balachander Krishnamurthy, and Alan Mislove 2014. Towards Detecting Anomalous User Behavior in Online Social Networks. Usenix Security, Vol. Vol. 14.
[77]
Alex Hai Wang. 2010. Detecting spam bots in online social networking sites: a machine learning approach. Data and Applications Security and Privacy XXIV. Springer, 335--342.
[78]
Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, and Ben Y Zhao. 2013. You Are How You Click: Clickstream Analysis for Sybil Detection. Usenix Security, Vol. Vol. 14.
[79]
Yi Wang, Hongjie Bai, Matt Stanton, Wen-Yen Chen, and Edward Y Chang 2009. Plda: Parallel latent dirichlet allocation for large-scale applications International Conference on Algorithmic Applications in Management. Springer, 301--314.
[80]
Jianshu Weng, Ee-Peng Lim, Jing Jiang, and Qi He. 2010. Twitterrank: finding topic-sensitive influential twitterers Proceedings of the third ACM international conference on Web search and data mining. ACM, 261--270.
[81]
Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. 2013. Virality prediction and community structure in social networks. Scientific reports Vol. 3 (2013).
[82]
Baoning Wu, Vinay Goel, and Brian D Davison 2006. Topical trustrank: Using topicality to combat web spam Proceedings of the 15th international conference on World Wide Web. ACM, 63--72.
[83]
Wei Xu, Fangfang Zhang, and Sencun Zhu 2010. Toward worm detection in online social networks. Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 11--20.
[84]
Chao Yang, Robert Chandler Harkreader, and Guofei Gu. 2011. Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers Recent Advances in Intrusion Detection (RAID).
[85]
Sarita Yardi, Daniel Romero, Grant Schoenebeck, et almbox. 2009. Detecting spam in a twitter network. First Monday, Vol. 15, 1 (2009).
[86]
Shaozhi Ye and S Felix Wu 2010. Measuring message propagation and social influence on Twitter. Springer.

Cited By

View all
  • (2024)Third-Party Developers and Tool Development For Community Management on Live Streaming Platform TwitchProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642787(1-18)Online publication date: 11-May-2024
  • (2024)Systemization of Knowledge (SoK): Creating a Research Agenda for Human-Centered Real-Time Risk Detection on Social Media PlatformsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642315(1-21)Online publication date: 11-May-2024
  • (2024)A comprehensive survey on community detection methods and applications in complex information networksSocial Network Analysis and Mining10.1007/s13278-024-01246-514:1Online publication date: 18-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
October 2017
2682 pages
ISBN:9781450349468
DOI:10.1145/3133956
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. communities of interest
  2. information diffusion
  3. online social networks
  4. parties of interest
  5. spam detection

Qualifiers

  • Research-article

Funding Sources

Conference

CCS '17
Sponsor:

Acceptance Rates

CCS '17 Paper Acceptance Rate 151 of 836 submissions, 18%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,596
  • Downloads (Last 6 weeks)71
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Third-Party Developers and Tool Development For Community Management on Live Streaming Platform TwitchProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642787(1-18)Online publication date: 11-May-2024
  • (2024)Systemization of Knowledge (SoK): Creating a Research Agenda for Human-Centered Real-Time Risk Detection on Social Media PlatformsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642315(1-21)Online publication date: 11-May-2024
  • (2024)A comprehensive survey on community detection methods and applications in complex information networksSocial Network Analysis and Mining10.1007/s13278-024-01246-514:1Online publication date: 18-Apr-2024
  • (2024)Cyber Sentinels: Illuminating Malicious Intent in Social Networks Using Dual-Powered CHAMPervasive Knowledge and Collective Intelligence on Web and Social Media10.1007/978-3-031-66044-3_4(58-74)Online publication date: 13-Aug-2024
  • (2023)Hate Raids on Twitch: Understanding Real-Time Human-Bot Coordinated Attacks in Live Streaming CommunitiesProceedings of the ACM on Human-Computer Interaction10.1145/36101917:CSCW2(1-28)Online publication date: 4-Oct-2023
  • (2023)"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security ConferencesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623130(3433-3459)Online publication date: 15-Nov-2023
  • (2023)Understanding the Behaviors of Toxic Accounts on RedditProceedings of the ACM Web Conference 202310.1145/3543507.3583522(2797-2807)Online publication date: 30-Apr-2023
  • (2023)SpADe: Multi-Stage Spam Account Detection for Online Social NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.319883020:4(3128-3143)Online publication date: 1-Jul-2023
  • (2023)Early Malware Characterization based on Online Social Networks2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)10.1109/CommNet60167.2023.10365252(1-8)Online publication date: 11-Dec-2023
  • (2023)Learning textual features for Twitter spam detectionExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.120366228:COnline publication date: 15-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media