Faking Sandy
- 13 May 2013
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 729-736
- https://doi.org/10.1145/2487788.2488033
Abstract
No abstract availableThis publication has 21 references indexed in Scilit:
- Credibility in Context: An Analysis of Feature Distributions in TwitterPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Credibility ranking of tweets during high impact eventsPublished by Association for Computing Machinery (ACM) ,2012
- Analyzing spammers' social networks for fun and profitPublished by Association for Computing Machinery (ACM) ,2012
- Understanding and combating link farming in the twitter social networkPublished by Association for Computing Machinery (ACM) ,2012
- Tweeting is believing?Published by Association for Computing Machinery (ACM) ,2012
- Information Credibility on Twitter in Emergency SituationLecture Notes in Computer Science, 2012
- Tweet trend analysis in an emergency situationPublished by Association for Computing Machinery (ACM) ,2011
- Finding Credible Information Sources in Social Networks Based on Content and Social StructurePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Phi.sh/$oCiaLPublished by Association for Computing Machinery (ACM) ,2011
- Information control and terrorism: Tracking the Mumbai terrorist attack through twitterInformation Systems Frontiers, 2010