References
[1]. Allodi, L. (2017, October). Economic factors of vulnerability trade and exploitation. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1483-1499). ACM.
[2]. Anger, I., & Kittl, C. (2011, September). Measuring influence on Twitter. In Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies (p. 31). ACM.
[3]. Bessi, A., & Ferrara, E. (2016). Social bots distort the 2016 US Presidential election online discussion. First Monday, 21(11-7).
[4]. Chen, S. (2010). Cheetah: A high performance, custom data warehouse on top of MapReduce. Proceedings of the VLDB Endowment, 3(1-2), 1459-1468. doi:10.14778/1920841.1921020
[5]. Chung, W., & Zeng, D. (2016). Social media based public policy informatics: Sentiment and network analyses of US Immigration and border security. Journal of the Association for Information Science and Technology, 67(7), 1588-1606.
[6]. Dean, J., & Ghemawat, S. (2004). MapReduce: Simplified data processing on large clusters. Proceedings th of the 6 Conference on Symposium on Opearting Systems Design & Implementation (p.10).
[7]. Dean, J., & Ghemawat, S. (2008). MapReduce: Simplified data processing on large clusters. Communications of the ACM, 51(1), 107-113. doi:10.1145/1327452.1327492
[8]. Dean, J., & Ghemawat, S. (2010). MapReduce: A flexible data processing tool. Communications of the ACM, 53(1), 72-77. doi:10.1145/1629175.1629198
[9]. Dittrich, J., Quiané-Ruiz, J. A., Jindal, A., Kargin, Y., Setty, V., & Schad, J. (2010). Hadoop++: Making a yellow elephant run like a cheetah (without it even noticing). Proceedings of the VLDB Endowment, 3(1-2), 515-529.
[10]. Dittrich, J., Quiané-Ruiz, J. A., Richter, S., Schuh, S., Jindal, A., & Schad, J. (2012). Only aggressive elephants are fast elephants. Proceedings of the VLDB Endowment, 5(11), 1591-1602.
[11]. Eltabakh, M. Y., Tian, Y., Özcan, F., Gemulla, R., Krettek, A., & McPherson, J. (2011). CoHadoop: Flexible data placement and its exploitation in Hadoop. Proceedings of the VLDB Endowment, 4(9), 575-585. doi:10.14778/ 2002938.2002943
[12]. Ferrara, E. (2017). Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday, 22(8).
[13]. Goodhope, K., Koshy, J., Kreps, J., Narkhede, N., Park, R., Rao, J., & Ye, V. Y. (2012). Building LinkedIn's realtime activity data pipeline. IEEE Data Eng. Bull., 35(2), 33- 45.
[14]. Lam, W., Liu, L., Prasad, S., Rajaraman, A., Vacheri, Z., & Doan, A. (2012). Muppet: MapReduce-style processing of fast data. Proceedings of the VLDB Endowment, 5(12), 1814-1825. doi:10.14778/2367502.2367520
[15]. Leibiusky, J., Eisbruch, G., & Simonassi, D. (2012). Getting Started with Storm. O'Reilly Media, Inc. Retrieved from http://ifeve.com/wp-content/uploads/2014/03/ Getting-Started-With-Storm-Jonathan-Leibiusky-Gabriel- E_1276.pdf
[16]. Leontiadis, N., Moore, T., & Christin, N. (2011, August). Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In USENIX Security Symposium (Vol. 11).
[17]. Liang, Y., Zheng, X., Zeng, D. D., Zhou, X., Leischow, S. J., & Chung, W. (2015). Exploring how the tobacco industry presents and promotes itself in social media. Journal of Medical Internet Research, 17(1), e24.
[18]. Lin, Y., Agrawal, D., Chen, C., Ooi, B. C., & Wu, S. (2011, June). Llama: Leveraging columnar storage for scalable join processing in the MapReduce framework. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data (pp. 961-972). ACM. doi:10.1145/1989323.1989424
[19]. Marble, J. L., Lawless, W. F., Mittu, R., Coyne, J., Abramson, M., & Sibley, C. (2015). The human factor in cybersecurity: Robust & intelligent defense. In Cyber Warfare (pp. 173-206). Springer, Cham.
[20]. Moore, T., Clayton, R., & Anderson, R. (2009). The economics of online crime. Journal of Economic Perspectives, 23(3), 3-20.
[21]. Okutan, A., Yang, S. J., & McConky, K. (2017, April). Predicting cyber attacks with bayesian networks using unconventional signals. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (p. 13). ACM.
[22]. Subrahmanian, V. S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., ... & Menczer, F. (2016). The DARPA Twitter bot challenge. Computer, 49(6), 38-46.
[23]. Wieczner, J. (2016). CIA Director Is 'Disappointed' in Twitter and Dataminr. Fortune.
[24]. Zhou, J., Bruno, N., Wu, M. C., Larson, P. A., Chaiken, R., & Shakib, D. (2012). Scope: Parallel databases meet MapReduce. The VLDB Journal- The International Journal on Very Large Databases, 21(5), 611-636. doi:10.1007/ s00778-012-0280-z