Author of the publication

Badvertisements: Stealthy Click-Fraud with Unwitting Accessories.

, , and . J. Digital Forensic Practice, 1 (2): 131-142 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The role of information diffusion in the evolution of social networks, , , , , , , , and . Proc. 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), (2013)Truthy: Mapping the Spread of Astroturf in Microblog Streams, , , , , , and . Proc. 20th Intl. World Wide Web Conf. Companion (WWW), (2011)Traffic in Social Media II: Modeling Bursty Popularity., , , , and . SocialCom/PASSAT, page 393-400. IEEE Computer Society, (2010)Political Polarization on Twitter., , , , , and . ICWSM, The AAAI Press, (2011)Badvertisements: Stealthy Click-Fraud with Unwitting Accessories., , and . J. Digital Forensic Practice, 1 (2): 131-142 (2006)Predicting the Political Alignment of Twitter Users., , , , and . SocialCom/PASSAT, page 192-199. IEEE Computer Society, (2011)Truthy: mapping the spread of astroturf in microblog streams., , , , , , and . WWW (Companion Volume), page 249-252. ACM, (2011)Traffic in Social Media I: Paths Through Information Networks., , and . SocialCom/PASSAT, page 452-458. IEEE Computer Society, (2010)Detecting and Tracking Political Abuse in Social Media, , , , , and . Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM), (2011)Political Polarization on Twitter., , , , , and . ICWSM, (2011)