{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T13:30:35Z","timestamp":1770298235614,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319163536","type":"print"},{"value":"9783319163543","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16354-3_77","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T12:53:25Z","timestamp":1426510405000},"page":"703-714","source":"Crossref","is-referenced-by-count":43,"title":["Detecting Spam URLs in Social Media via Behavioral Analysis"],"prefix":"10.1007","author":[{"given":"Cheng","family":"Cao","sequence":"first","affiliation":[]},{"given":"James","family":"Caverlee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"77_CR1","doi-asserted-by":"crossref","unstructured":"Antoniades, D., et al.: we.b: the web of short urls. In: WWW (2011)","DOI":"10.1145\/1963405.1963505"},{"key":"77_CR2","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: CEAS (2010)"},{"key":"77_CR3","doi-asserted-by":"crossref","unstructured":"Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a fast filter for the large-scale detection of malicious web pages. In: WWW (2011)","DOI":"10.1145\/1963405.1963436"},{"key":"77_CR4","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F.: Know your neighbors: web spam detection using the web topology. In: SIGIR (2007)","DOI":"10.1145\/1277741.1277814"},{"key":"77_CR5","doi-asserted-by":"crossref","unstructured":"Chhabra, S., Aggarwal, A., Benevenuto, F., Kumaraguru, P.: Phi.sh\/$ocial: the phishing landscape through short urls. In: CEAS (2011)","DOI":"10.1145\/2030376.2030387"},{"key":"77_CR6","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious javascript code. In: WWW (2010)","DOI":"10.1145\/1772690.1772720"},{"key":"77_CR7","doi-asserted-by":"crossref","unstructured":"Cui, A., Zhang, M., Liu, Y., Ma, S.: Are the urls really popular in microblog messages? In: CCIS (2011)","DOI":"10.1109\/CCIS.2011.6045021"},{"key":"77_CR8","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: CCS (2010)","DOI":"10.1145\/1866307.1866311"},{"key":"77_CR9","doi-asserted-by":"crossref","unstructured":"Klien, F., Strohmaier, M.: Short links under attack: geographical analysis of spam in a url shortener network. In: HT (2012)","DOI":"10.1145\/2309996.2310010"},{"key":"77_CR10","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: SIGIR (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"77_CR11","unstructured":"Lee, S., Kim, J.: WarningBird: Detecting suspicious URLs in Twitter stream. In: NDSS (2012)"},{"key":"77_CR12","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: KDD (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"77_CR13","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Identifying suspicious urls: an application of large-scale online learning. In: ICML (2009)","DOI":"10.1145\/1553374.1553462"},{"key":"77_CR14","doi-asserted-by":"crossref","unstructured":"Maggi, F., et al.: Two years of short urls internet measurement: security threats and countermeasures. In: WWW (2013)","DOI":"10.1145\/2488388.2488463"},{"key":"77_CR15","unstructured":"McGrath, D.K., Gupta, M.: Behind phishing: an examination of phisher modi operandi. In: LEET (2008)"},{"key":"77_CR16","unstructured":"Neumann, A., Barnickel, J., Meyer, U.: Security and privacy implications of url shortening services. In: W2SP (2010)"},{"key":"77_CR17","doi-asserted-by":"crossref","unstructured":"Rodrigues, T., Benevenuto, F., Cha, M., Gummadi, K., Almeida, V.: On word-of-mouth based discovery of the web. In: SIGCOMM (2011)","DOI":"10.1145\/2068816.2068852"},{"key":"77_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","volume-title":"Recent Advances in Intrusion Detection","author":"J. Song","year":"2011","unstructured":"Song, J., Lee, S., Kim, J.: Spam filtering in twitter using sender-receiver relationship. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 301\u2013317. Springer, Heidelberg (2011)"},{"key":"77_CR19","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: ACSAC (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"77_CR20","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: SP (2011)","DOI":"10.1109\/SP.2011.25"},{"key":"77_CR21","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: IMC (2011)","DOI":"10.1145\/2068816.2068840"},{"key":"77_CR22","doi-asserted-by":"crossref","unstructured":"Wang, G., et al.: Serf and turf: crowdturfing for fun and profit. In: WWW (2012)","DOI":"10.1145\/2187836.2187928"},{"key":"77_CR23","unstructured":"Wang, G., et al.: You are how you click: Clickstream analysis for sybil detection. In: USENIX (2013)"},{"key":"77_CR24","unstructured":"Wang, Y., et al.: Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In: NDSS (2006)"},{"key":"77_CR25","doi-asserted-by":"crossref","unstructured":"Wei, C., et al.: Fighting against web spam: A novel propagation method based on click-through data. In: SIGIR (2012)","DOI":"10.1145\/2348283.2348338"},{"key":"77_CR26","unstructured":"Whittaker, C., Ryner, B., Nazif, M.: Large-Scale automatic classification of phishing pages. In: NDSS (2010)"},{"key":"77_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"C. Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 318\u2013337. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16354-3_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T16:33:33Z","timestamp":1559147613000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16354-3_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319163536","9783319163543"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16354-3_77","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}