These are the sources and citations used to research My Reading Articles. This bibliography was generated on Cite This For Me on
In-text: (Alexa Top 500 Global Sites, 2015)
Your Bibliography: Alexa.com. 2015. Alexa Top 500 Global Sites. [online] Available at: <http://www.alexa.com/topsites> [Accessed 14 May 2015].
In-text: (Bhatt, Yano and Gustavsson, 2014)
Your Bibliography: Bhatt, P., Yano, E. and Gustavsson, P., 2014. Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks. 2014 IEEE 8th International Symposium on Service Oriented System Engineering,.
In-text: (Clark, 2015)
Your Bibliography: Clark, D., 2015. The Bot Bubble: Click Farms Have Inflated Social Media Currency. [online] The New Republic. Available at: <http://www.newrepublic.com/article/121551/bot-bubble-click-farms-have-inflated-social-media-currency> [Accessed 1 May 2015].
In-text: (Safe Browsing API — Google Developers, 2015)
Your Bibliography: Google Developers. 2015. Safe Browsing API — Google Developers. [online] Available at: <https://developers.google.com/safe-browsing/> [Accessed 4 May 2015].
In-text: (2 MILLION Hillary Twitter followers are fake or people who never tweet, 2015)
Your Bibliography: Mail Online. 2015. 2 MILLION Hillary Twitter followers are fake or people who never tweet. [online] Available at: <http://www.dailymail.co.uk/news/article-3038621/More-2-MILLION-Hillary-Clinton-s-Twitter-followers-fake-never-tweet.html> [Accessed 1 May 2015].
In-text: (Richardson, 2015)
Your Bibliography: Richardson, C., 2015. Google Discusses Its Safe Browsing Record. [online] WebProNews. Available at: <http://www.webpronews.com/google-discusses-its-safe-browsing-record-2012-06> [Accessed 5 May 2015].
In-text: (Schell and Martin, 2006)
Your Bibliography: Schell, B. and Martin, C., 2006. Webster's new world hacker dictionary. Indianapolis, IN: Wiley Pub.
In-text: (What is social network analysis? A Webopedia Definition, 2015)
Your Bibliography: Webopedia.com. 2015. What is social network analysis? A Webopedia Definition. [online] Available at: <http://www.webopedia.com/TERM/S/social_network_analysis.html> [Accessed 30 April 2015].
In-text: (Blacklist (computing), 2015)
Your Bibliography: Wikipedia. 2015. Blacklist (computing). [online] Available at: <http://en.wikipedia.org/wiki/Blacklist_(computing)> [Accessed 5 May 2015].
In-text: (Xu, Wang and Jajodia, 2014)
Your Bibliography: Xu, Z., Wang, H. and Jajodia, S., 2014. Gemini: An Emergency Line of Defense against Phishing Attacks. 2014 IEEE 33rd International Symposium on Reliable Distributed Systems,.
In-text: (Yang et al., 2014)
Your Bibliography: Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B. and Dai, Y., 2014. Uncovering social network Sybils in the wild. ACM Transactions on Knowledge Discovery from Data, 8(1), pp.1-29.
10,587 students joined last month!