Author of the publication

Badvertisements: Stealthy Click-Fraud with Unwitting Accessories.

, , and . J. Digital Forensic Practice, 1 (2): 131-142 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The role of information diffusion in the evolution of social networks, , , , , , , , and . Proc. 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), (2013)Truthy: Mapping the Spread of Astroturf in Microblog Streams, , , , , , and . Proc. 20th Intl. World Wide Web Conf. Companion (WWW), (2011)Political Polarization on Twitter., , , , , and . ICWSM, The AAAI Press, (2011)Traffic in Social Media II: Modeling Bursty Popularity., , , , and . SocialCom/PASSAT, page 393-400. IEEE Computer Society, (2010)Badvertisements: Stealthy Click-Fraud with Unwitting Accessories., , and . J. Digital Forensic Practice, 1 (2): 131-142 (2006)Truthy: mapping the spread of astroturf in microblog streams., , , , , , and . WWW (Companion Volume), page 249-252. ACM, (2011)Predicting the Political Alignment of Twitter Users., , , , and . SocialCom/PASSAT, page 192-199. IEEE Computer Society, (2011)Traffic in Social Media I: Paths Through Information Networks., , and . SocialCom/PASSAT, page 452-458. IEEE Computer Society, (2010)Political Polarization on Twitter., , , , , and . ICWSM, (2011)Designing ethical phishing experiments: a study of (ROT13) rOnl query features., and . WWW, page 513-522. ACM, (2006)