{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T04:34:32Z","timestamp":1766378072061,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030661861"},{"type":"electronic","value":"9783030661878"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-66187-8_10","type":"book-chapter","created":{"date-parts":[[2020,12,19]],"date-time":"2020-12-19T06:02:44Z","timestamp":1608357764000},"page":"94-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detection of Misbehaviors in Clone Identities on Online Social Networks"],"prefix":"10.1007","author":[{"given":"Rishabh","family":"Kaushal","sequence":"first","affiliation":[]},{"given":"Chetna","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,20]]},"reference":[{"key":"10_CR1","unstructured":"List of 723 bad words to blacklist & how to use facebook\u2019s moderation tool. Front Gate Media (May 2014). https:\/\/www.frontgatemedia.com\/a-list-of-723-bad-words-to-blacklist-and-how-to-use-facebooks-moderation-tool\/, [Online; posted 12 May 2014]"},{"key":"10_CR2","unstructured":"What is facebook cloning and how can i protect myself from it? Hoax Slayer (July 2017). https:\/\/www.hoax-slayer.net\/what-is-facebook-cloning-and-how-can-i-protect-myself-from-it\/, [Online; posted 25 July 2017]"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Kumar, S., Bhargava, K., Kumaraguru, P.: The follower count fallacy: detecting twitter users with manipulated follower count (2018)","DOI":"10.1145\/3167132.3167318"},{"key":"10_CR4","unstructured":"Author, C.: Magic marketing words you should be using. Vertical Response (September 2017). https:\/\/www.verticalresponse.com\/blog\/the-30-magic-marketing-words\/, [Online; posted 19 September 2017]"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, pp. 551\u2013560. ACM (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"10_CR6","unstructured":"Buxton, M.: The social scam: for a-listers, imposters still loom large. Refinery29 (May 2018). https:\/\/www.refinery29.com\/2018\/05\/195519\/celebrity-impersonation-accounts-fake-instagram-twitter, [Online; posted 2 May 2018]"},{"key":"10_CR7","unstructured":"Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. pp. 15\u201315. USENIX Association (2012)"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake twitter followers. Decis. Support Syst. 80, 56\u201371 (2015)","journal-title":"Decis. Support Syst."},{"key":"10_CR9","unstructured":"Glover, R.: Building a twitter clone. The Meteor Chef (August 2017). https:\/\/themeteorchef.com\/tutorials\/building-a-twitter-clone, [Online; posted 31 August 2017]"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Goga, O., Venkatadri, G., Gummadi, K.P.: The doppelg\u00e4nger bot attack: exploring identity impersonation in online social networks. In: Proceedings of the 2015 Internet Measurement Conference, pp. 141\u2013153. ACM (2015)","DOI":"10.1145\/2815675.2815699"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Gupta, A., Kaushal, R.: Towards detecting fake user accounts in facebook. In: Asia Security and Privacy (ISEASP), ISEA 2017, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ISEASP.2017.7976996"},{"issue":"5","key":"10_CR12","doi-asserted-by":"publisher","first-page":"2345","DOI":"10.1016\/j.eswa.2013.09.032","volume":"41","author":"BZ He","year":"2014","unstructured":"He, B.Z., Chen, C.M., Su, Y.P., Sun, H.M.: A defence scheme against identity theft attack based on multiple social networks. Expert Syst. Appl. 41(5), 2345\u20132352 (2014)","journal-title":"Expert Syst. Appl."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Jin, L., Takabi, H., Joshi, J.B.: Towards active detection of identity clone attacks on online social networks. In: Proceedings of the first ACM Conference on Data and Application Security and Privacy, pp. 27\u201338. ACM (2011)","DOI":"10.1145\/1943513.1943520"},{"key":"10_CR14","unstructured":"Kharaji, M.Y., Rizi, F.S., Khayyambashi, M.R.: A new approach for finding cloned profiles in online social networks. arXiv preprint arXiv:1406.7377 (2014)"},{"key":"10_CR15","unstructured":"Lips, A.: Everyone wants to get verified on social media, but it\u2019s not usually an easy process. Social Media Week (March 2018). https:\/\/socialmediaweek.org\/blog\/2018\/03\/can-i-get-verified-verification-guidelines-for-social-media\/, [Online; posted 16 March 2018]"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(12)70007-6","volume":"2012","author":"B Parmar","year":"2012","unstructured":"Parmar, B.: Protecting against spear-phishing. Comput. Fraud Secur. 2012(1), 8\u201311 (2012)","journal-title":"Comput. Fraud Secur."},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Sen, I., Aggarwal, A., Mian, S., Singh, S., Kumaraguru, P., Datta, A.: Worth its weight in likes: towards detecting fake likes on instagram. In: Proceedings of the 10th ACM Conference on Web Science, pp. 205\u2013209. ACM (2018)","DOI":"10.1145\/3201064.3201105"},{"key":"10_CR18","unstructured":"Slotkin, J.: Twitter \u2018bots\u2019 steal tweeters\u2019 identities. Market Place (May 2013). https:\/\/www.marketplace.org\/2013\/05\/27\/tech\/twitter-bots-steal-tweeters-identities, [Online; posted 27 May 2013]"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Viswanath, B., et al.: Exploring the design space of social network-based sybil defenses. In: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/COMSNETS.2012.6151333"},{"key":"10_CR20","unstructured":"Wang, G., et al.: Social turing tests: crowdsourcing sybil detection. arXiv preprint arXiv:1205.3856 (2012)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: ACM SIGCOMM Computer Communication Review, vol. 36, pp. 267\u2013278. ACM (2006)","DOI":"10.1145\/1151659.1159945"}],"container-title":["Lecture Notes in Computer Science","Mining Intelligence and Knowledge Exploration"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-66187-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,19]],"date-time":"2020-12-19T06:09:02Z","timestamp":1608358142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-66187-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030661861","9783030661878"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-66187-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIKE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mining Intelligence and Knowledge Exploration","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Goa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mike2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mike.org.in\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}