{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:32Z","timestamp":1759092212286},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642155116"},{"type":"electronic","value":"9783642155123"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15512-3_22","type":"book-chapter","created":{"date-parts":[[2010,8,31]],"date-time":"2010-08-31T12:27:39Z","timestamp":1283257659000},"page":"422-441","source":"Crossref","is-referenced-by-count":71,"title":["Abusing Social Networks for Automated User Profiling"],"prefix":"10.1007","author":[{"given":"Marco","family":"Balduzzi","sequence":"first","affiliation":[]},{"given":"Christian","family":"Platzer","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Dwyer, C., Hiltz, S.: Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace. In: Proceedings of the Thirteenth Americas Conference on Information Systems, AMCIS (2007)"},{"issue":"1","key":"22_CR2","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chb.2008.08.006","volume":"25","author":"J. Fogel","year":"2009","unstructured":"Fogel, J., Nehmad, E.: Internet social network communities: Risk taking, trust, and privacy concerns. Comput. Hum. Behav.\u00a025(1), 153\u2013160 (2009)","journal-title":"Comput. Hum. Behav."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A., Heinz III, H.J.: Information revelation and privacy in online social networks. In: ACM Workshop on Privacy in the Electronic Society, WPES (2005)","DOI":"10.1145\/1102199.1102214"},{"issue":"10","key":"22_CR4","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"T.N. Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. ACM Commun.\u00a050(10), 94\u2013100 (2007)","journal-title":"ACM Commun."},{"issue":"2","key":"22_CR5","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2008.52","volume":"6","author":"M. Jakobsson","year":"2008","unstructured":"Jakobsson, M., Finn, P., Johnson, N.: Why and How to Perform Fraud Experiments. IEEE Security & Privacy\u00a06(2), 66\u201368 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Ratkiewicz, J.: Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In: 15th International Conference on World Wide Web, WWW (2006)","DOI":"10.1145\/1135777.1135853"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Brown, G., Howe, T., Ihbe, M., Prakash, A., Borders, K.: Social networks and context-aware spam. In: ACM Conference on Computer Supported Cooperative Work, CSCW (2008)","DOI":"10.1145\/1460563.1460628"},{"key":"22_CR8","unstructured":"News, H.: Spam-Bots werten soziale Netze aus (September 2009), http:\/\/www.heise.de\/security\/Spam-Bots-werten-soziale-Netze-aus-\/news\/meldung\/145344"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Klensin, J.: Simple Mail Transfer Protocol. RFC 5321 (Draft Standard) (October 2008)","DOI":"10.17487\/rfc5321"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Zimmerman, D.: The Finger User Information Protocol. RFC 1288 (Draft Standard) (December 1991)","DOI":"10.17487\/rfc1288"},{"key":"22_CR11","unstructured":"Bugtraq: OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability (April 2003), http:\/\/www.securityfocus.com\/bid\/7467"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Bortz, A., Boneh, D.: Exposing private information by timing web applications. In: 16th International Conference on World Wide Web (2007)","DOI":"10.1145\/1242572.1242656"},{"key":"22_CR13","unstructured":"Python Software Foundation: Python 2.6 urllib module, http:\/\/docs.python.org\/library\/urllib.html"},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/CSE.2009.459","volume":"3","author":"D. Irani","year":"2009","unstructured":"Irani, D., Webb, S., Li, K., Pu, C.: Large online social footprints\u2013an emerging threat. IEEE International Conference on Computational Science and Engineering\u00a03, 271\u2013276 (2009)","journal-title":"IEEE International Conference on Computational Science and Engineering"},{"key":"22_CR15","unstructured":"Facebook: Statistics (April 2010), http:\/\/www.facebook.com\/press\/info.php?statistics"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: 16th International Conference on World Wide Web (WWW), New York, NY, USA (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656. Springer, Heidelberg (2003)"},{"key":"22_CR18","unstructured":"Danchev, D.: Inside India\u2019s CAPTCHA solving economy (August 2008), http:\/\/blogs.zdnet.com\/security\/?p=1835"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Simard, P.Y.: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In: Neural Information Processing Systems, NIPS (2004)","DOI":"10.1145\/1054972.1055070"},{"key":"22_CR20","unstructured":"Mori, G., Malik, J.: Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In: IEEE Conference on Computer Vision & Pattern Recognition, CVPR (2003)"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: A low-cost attack on a Microsoft CAPTCHA. In: 15th ACM Conference on Computer and Communications Security, CCS (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: 18th International Conference on World Wide Web, WWW (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Preibusch, S.: The Privacy Jungle: On the Market for Privacy in Social Networks. In: Workshop on the Economics of Information Security, WEIS (2009)","DOI":"10.1007\/978-1-4419-6967-5_8"},{"key":"22_CR24","unstructured":"Chew, M., Balfanz, D., Laurie, B.: (Under)mining Privacy in Social Networks. In: Proceedings of Web 2.0 Security and Privacy Workshop, W2SP (2008)"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Jones, S., Millermaier, S., Goya-Martinez, M., Schuler, J.: Whose space is MySpace? A content analysis of MySpace profiles. First Monday\u00a012(9) (August 2008)","DOI":"10.5210\/fm.v13i9.2202"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Wills, C.E.: Characterizing Privacy in Online Social Networks. In: Workshop on Online Social Networks, WOSN (2008)","DOI":"10.1145\/1397735.1397744"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Anderson, J., Danezis, G.: Prying Data out of a Social Network. In: First International Conference on Advances in Social Networks Analysis and Mining (2009)","DOI":"10.1109\/ASONAM.2009.45"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Chau, D.H., Pandit, S., Wang, S., Faloutsos, C.: Parallel Crawling for Online Social Networks. In: 16th International Conference on World Wide Web, WWW (2007)","DOI":"10.1145\/1242572.1242809"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and Analysis of Online Social Networks. In: ACM SIGCOMM Conference on Internet Measurement, IMC (2007)","DOI":"10.1145\/1298306.1298311"},{"key":"22_CR30","volume-title":"4th ACM European Conference on Computer Systems (EuroSys)","author":"C. Wilson","year":"2009","unstructured":"Wilson, C., Boe, B., Sala, A., Puttaswamy, K.P.N., Zhao, B.Y.: User Interactions in Social Networks and their Implications. In: 4th ACM European Conference on Computer Systems (EuroSys). ACM, New York (2009)"},{"key":"22_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/11496137_7","volume-title":"Applied Cryptography and Network Security","author":"V. Griffith","year":"2005","unstructured":"Griffith, V., Jakobsson, M.: Messin\u2019 with texas, deriving mother\u2019s maiden names using public records. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 91\u2013103. Springer, Heidelberg (2005)"},{"key":"22_CR32","unstructured":"Raymond Heatherly, M.K., Thuraisingham, B.: Preventing private information inference attacks on social networks. Technical Report UTDCS-03-09, University of Texas at Dallas (2009)"},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To Join or Not To Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In: 18th International Conference on World Wide Web, WWW (2009)","DOI":"10.1145\/1526709.1526781"},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust De-anonymization of Large Sparse Datasets. In: IEEE Symposium on Security and Privacy (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: IEEE Symposium on Security and Privacy (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical Attack to De-Anonymize Social Network Users. In: IEEE Symposium on Security and Privacy (2010)","DOI":"10.1109\/SP.2010.21"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15512-3_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,7]],"date-time":"2021-11-07T18:06:54Z","timestamp":1636308414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15512-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642155116","9783642155123"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15512-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}