Ratkiewicz, J., Conover, M. D., Meiss, M., Gonçalves, B., Flammini, A., & Menczer, F. M. (2011, July). Detecting and tracking political abuse in social media. In Fifth international AAAI conference on weblogs and social media.
Ma, J., Saul, L. K., Savage, S., & Voelker, G. M. (2009, June). Identifying suspicious URLs: an application of large-scale online learning. In Proceedings of the 26th annual international conference on machine learning (pp. 681-688). ACM.
Ramachandran, A., & Feamster, N. (2006, September). Understanding the network-level behavior of spammers. In ACM SIGCOMM Computer Communication Review (Vol. 36, No. 4, pp. 291-302). ACM.
Hao, S., Kantchelian, A., Miller, B., Paxson, V., & Feamster, N. (2016, October). PREDATOR: proactive recognition and elimination of domain abuse at time-of-registration. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1568-1579). ACM.
Hao, S., Syed, N. A., Feamster, N., Gray, A. G., & Krasser, S. (2009, August). Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX security symposium (Vol. 9).
Thomas, K., Grier, C., Ma, J., Paxson, V., & Song, D. (2011, May). Design and evaluation of a real-time url spam filtering service. In 2011 IEEE symposium on security and privacy (pp. 447-462). IEEE.
Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010, October). @ spam: the underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and communications security (pp. 27-37). ACM.