{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:37:38Z","timestamp":1725892658944},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642365157"},{"type":"electronic","value":"9783642365164"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36516-4_21","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T09:11:01Z","timestamp":1363165861000},"page":"208-217","source":"Crossref","is-referenced-by-count":10,"title":["Searching for Spam: Detecting Fraudulent Accounts via Web Search"],"prefix":"10.1007","author":[{"given":"Marcel","family":"Flores","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aleksandar","family":"Kuzmanovic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1866307.1866311","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010","author":"C. Grier","year":"2010","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 27\u201337. ACM, New York (2010)"},{"unstructured":"Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Towards Online Spam Filtering in Social Networks. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium (February 2012)","key":"21_CR2"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/2068816.2068840","volume-title":"Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011","author":"K. Thomas","year":"2011","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, pp. 243\u2013258. ACM, New York (2011)"},{"key":"21_CR4","first-page":"35","volume-title":"Proceedings of the 10th Annual Conference on Internet Measurement, IMC 2010","author":"H. Gao","year":"2010","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th Annual Conference on Internet Measurement, IMC 2010, pp. 35\u201347. ACM, New York (2010)"},{"doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Vern, P., Song, D.: Design and evaluation of a real-time url spam filtering service. In: 2011 IEEE Symposium on Security and Privacy, SP, pp. 447\u2013462 (May 2011)","key":"21_CR5","DOI":"10.1109\/SP.2011.25"},{"unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting Spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS (July 2010)","key":"21_CR6"},{"key":"21_CR7","first-page":"435","volume-title":"Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010","author":"K. Lee","year":"2010","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010, pp. 435\u2013442. ACM, New York (2010)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","volume-title":"Recent Advances in Intrusion Detection","author":"J. Song","year":"2011","unstructured":"Song, J., Lee, S., Kim, J.: Spam Filtering in Twitter Using Sender-Receiver Relationship. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 301\u2013317. Springer, Heidelberg (2011)"},{"unstructured":"Wang, A.: Don\u2019t follow me: Spam detection in twitter. In: Proceedings of the 2010 International Conference on Security and Cryptography, SECRYPT, pp. 1\u201310 (July 2010)","key":"21_CR9"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"C. Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 318\u2013337. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Yardi, C., Romero, D., Schoenebeck, G., Boyd, D.: Detecting spam in a twitter network. First Monday\u00a015(1) (2010)","key":"21_CR11","DOI":"10.5210\/fm.v15i1.2793"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1920261.1920263","volume-title":"Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010","author":"G. Stringhini","year":"2010","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 1\u20139. ACM, New York (2010)"},{"doi-asserted-by":"crossref","unstructured":"Yerva, S., Mikl\u00f3s, Z., Aberer, K.: What have fruits to do with technology?: the case of orange, blackberry and apple. In: Proceedings of the International Conference on Web Intelligence, Mining and Semantics, WIMS 2011, pp. 48:1\u201348:10. ACM, New York (2011)","key":"21_CR13","DOI":"10.1145\/1988688.1988745"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36516-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T15:08:36Z","timestamp":1557587316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36516-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642365157","9783642365164"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36516-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}