These are the sources and citations used to research My Reading Articles. This bibliography was generated on Cite This For Me on

  • Website

    Alexa Top 500 Global Sites

    2015

    In-text: (Alexa Top 500 Global Sites, 2015)

    Your Bibliography: Alexa.com. 2015. Alexa Top 500 Global Sites. [online] Available at: <http://www.alexa.com/topsites> [Accessed 14 May 2015].

  • Journal

    Bhatt, P., Yano, E. T. and Gustavsson, P.

    Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks

    2014 - 2014 IEEE 8th International Symposium on Service Oriented System Engineering

    In-text: (Bhatt, Yano and Gustavsson, 2014)

    Your Bibliography: Bhatt, P., Yano, E. and Gustavsson, P., 2014. Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks. 2014 IEEE 8th International Symposium on Service Oriented System Engineering,.

  • Website

    Clark, D. B.

    The Bot Bubble: Click Farms Have Inflated Social Media Currency

    2015

    In-text: (Clark, 2015)

    Your Bibliography: Clark, D., 2015. The Bot Bubble: Click Farms Have Inflated Social Media Currency. [online] The New Republic. Available at: <http://www.newrepublic.com/article/121551/bot-bubble-click-farms-have-inflated-social-media-currency> [Accessed 1 May 2015].

  • Website

    Safe Browsing API — Google Developers

    2015

    In-text: (Safe Browsing API — Google Developers, 2015)

    Your Bibliography: Google Developers. 2015. Safe Browsing API — Google Developers. [online] Available at: <https://developers.google.com/safe-browsing/> [Accessed 4 May 2015].

  • Website

    2 MILLION Hillary Twitter followers are fake or people who never tweet

    2015

    In-text: (2 MILLION Hillary Twitter followers are fake or people who never tweet, 2015)

    Your Bibliography: Mail Online. 2015. 2 MILLION Hillary Twitter followers are fake or people who never tweet. [online] Available at: <http://www.dailymail.co.uk/news/article-3038621/More-2-MILLION-Hillary-Clinton-s-Twitter-followers-fake-never-tweet.html> [Accessed 1 May 2015].

  • Website

    Richardson, C.

    Google Discusses Its Safe Browsing Record

    2015

    In-text: (Richardson, 2015)

    Your Bibliography: Richardson, C., 2015. Google Discusses Its Safe Browsing Record. [online] WebProNews. Available at: <http://www.webpronews.com/google-discusses-its-safe-browsing-record-2012-06> [Accessed 5 May 2015].

  • Book

    Schell, B. H. and Martin, C.

    Webster's new world hacker dictionary

    2006 - Wiley Pub. - Indianapolis, IN

    In-text: (Schell and Martin, 2006)

    Your Bibliography: Schell, B. and Martin, C., 2006. Webster's new world hacker dictionary. Indianapolis, IN: Wiley Pub.

  • Website

    What is social network analysis? A Webopedia Definition

    2015

    In-text: (What is social network analysis? A Webopedia Definition, 2015)

    Your Bibliography: Webopedia.com. 2015. What is social network analysis? A Webopedia Definition. [online] Available at: <http://www.webopedia.com/TERM/S/social_network_analysis.html> [Accessed 30 April 2015].

  • Website

    Blacklist (computing)

    2015

    In-text: (Blacklist (computing), 2015)

    Your Bibliography: Wikipedia. 2015. Blacklist (computing). [online] Available at: <http://en.wikipedia.org/wiki/Blacklist_(computing)> [Accessed 5 May 2015].

  • Journal

    Xu, Z., Wang, H. and Jajodia, S.

    Gemini: An Emergency Line of Defense against Phishing Attacks

    2014 - 2014 IEEE 33rd International Symposium on Reliable Distributed Systems

    In-text: (Xu, Wang and Jajodia, 2014)

    Your Bibliography: Xu, Z., Wang, H. and Jajodia, S., 2014. Gemini: An Emergency Line of Defense against Phishing Attacks. 2014 IEEE 33rd International Symposium on Reliable Distributed Systems,.

  • Journal

    Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B. Y. and Dai, Y.

    Uncovering social network Sybils in the wild

    2014 - ACM Transactions on Knowledge Discovery from Data

    In-text: (Yang et al., 2014)

    Your Bibliography: Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B. and Dai, Y., 2014. Uncovering social network Sybils in the wild. ACM Transactions on Knowledge Discovery from Data, 8(1), pp.1-29.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join