Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media | IEEE Conference Publication | IEEE Xplore