{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:18:56Z","timestamp":1773479936137,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642224232","type":"print"},{"value":"9783642224249","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22424-9_4","type":"book-chapter","created":{"date-parts":[[2011,6,20]],"date-time":"2011-06-20T06:37:35Z","timestamp":1308551855000},"page":"55-74","source":"Crossref","is-referenced-by-count":66,"title":["Reverse Social Engineering Attacks in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Danesh","family":"Irani","sequence":"first","affiliation":[]},{"given":"Marco","family":"Balduzzi","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[]},{"given":"Calton","family":"Pu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Sophos Facebook ID Probe (2008), http:\/\/www.sophos.com\/pressoffice\/news\/articles\/2007\/08\/facebook.html"},{"key":"4_CR2","unstructured":"Facebook Statistics (2010), http:\/\/www.facebook.com\/press\/info.php?statistics"},{"key":"4_CR3","unstructured":"Sophos Security Threat 2010 (2010), http:\/\/www.sophos.com\/sophos\/docs\/eng\/papers\/sophos-security-threat-report-jan-2010-wpna.pdf"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-15512-3_22","volume-title":"Recent Advances in Intrusion Detection","author":"M. Balduzzi","year":"2010","unstructured":"Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing Social Networks for Automated User Profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 422\u2013441. Springer, Heidelberg (2010)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: 18th International Conference on World Wide Web, WWW (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1080\/15427951.2007.10129290","volume":"4","author":"A. Flaxman","year":"2007","unstructured":"Flaxman, A.: Expansion and lack thereof in randomly perturbed graphs. Internet Mathematics\u00a04(2), 131\u2013147 (2007)","journal-title":"Internet Mathematics"},{"key":"4_CR8","first-page":"1","volume-title":"eCrime Researchers Summit","author":"D. Irani","year":"2008","unstructured":"Irani, D., Webb, S., Giffin, J., Pu, C.: Evolutionary study of phishing. In: eCrime Researchers Summit, pp. 1\u201310. IEEE, Los Alamitos (2008)"},{"key":"4_CR9","unstructured":"Irani, D., Webb, S., Pu, C., Li, K.: Study of Trend-Stuffing on Twitter through Text Classification. In: Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS (2010)"},{"issue":"10","key":"4_CR10","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"T.N. Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM\u00a050(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2008.52","volume":"6","author":"M. Jakobsson","year":"2008","unstructured":"Jakobsson, M., Finn, P., Johnson, N.: Why and How to Perform Fraud Experiments. IEEE Security & Privacy\u00a06(2), 66\u201368 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Ratkiewicz, J.: Designing ethical phishing experiments: a study of (ROT13) rOnl query features. In: 15th International Conference on World Wide Web, WWW (2006)","DOI":"10.1145\/1135777.1135853"},{"key":"4_CR13","unstructured":"Lauinger, T., Pankakoski, V., Balzarotti, D., Kirda, E.: Honeybot, your man in the middle for automated social engineering. In: LEET 2010, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, San Jose (2010)"},{"key":"4_CR14","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"K. Mitnick","year":"2002","unstructured":"Mitnick, K., Simon, W.L., Wozniak, S.: The Art of Deception: Controlling the Human Element of Security. Wiley, Chichester (2002)"},{"issue":"3","key":"4_CR15","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"M. Porter","year":"1980","unstructured":"Porter, M.: An algorithm for suffix stripping. Program\u00a014(3), 130\u2013137 (1980)","journal-title":"Program"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting Spammers on Social Networks. In: Annual Computer Security Applications Conference, ACSAC (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"4_CR17","unstructured":"Webb, S., Caverlee, J., Pu, C.: Social Honeypots: Making Friends with a Spammer Near You. In: Conference on Email and Anti-Spam, CEAS (2008)"},{"key":"4_CR18","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1145\/1159913.1159945","volume-title":"Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"H. Yu","year":"2006","unstructured":"Yu, H., Kaminsky, M., Gibbons, P., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 267\u2013278. ACM, New York (2006)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.\u00a0B., Flaxman, A.: SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In: IEEE Symposium on Security and Privacy (2008)","DOI":"10.1109\/SP.2008.13"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22424-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T23:18:42Z","timestamp":1637882322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22424-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642224232","9783642224249"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22424-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}