{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:34:42Z","timestamp":1725489282559},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642374005"},{"type":"electronic","value":"9783642374012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37401-2_28","type":"book-chapter","created":{"date-parts":[[2013,3,22]],"date-time":"2013-03-22T00:03:25Z","timestamp":1363910605000},"page":"268-279","source":"Crossref","is-referenced-by-count":3,"title":["Identification of Sybil Communities Generating Context-Aware Spam on Online Social Networks"],"prefix":"10.1007","author":[{"given":"Faraz","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Abulaish","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M.: Key challenges in defending against malicious socialbots. In: Proceedings of the 5th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET, vol.\u00a012 (2012)"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-24178-9_21","volume-title":"Information Hiding","author":"S. Nagaraja","year":"2011","unstructured":"Nagaraja, S., Houmansadr, A., Piyawongwisal, P., Singh, V., Agarwal, P., Borisov, N.: Stegobot: A covert social network botnet. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol.\u00a06958, pp. 299\u2013313. Springer, Heidelberg (2011)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Thomas, K., Nicol, D.: The koobface botnet and the rise of social malware. In: IEEE 2010 5th International Conference on Malicious and Unwanted Software, MALWARE, pp. 63\u201370 (2010)","DOI":"10.1109\/MALWARE.2010.5665793"},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/1151659.1159945","volume":"36","author":"H. Yu","year":"2006","unstructured":"Yu, H., Kaminsky, M., Gibbons, P., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Computer Communication Review\u00a036, 267\u2013278 (2006)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Gossip algorithms: Design, analysis and applications. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2005, vol.\u00a03, pp. 1653\u20131664. IEEE (2005)","DOI":"10.1109\/INFCOM.2005.1498447"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/11555827_18","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G. Danezis","year":"2005","unstructured":"Danezis, G., Lesniewski-Laas, C., Frans Kaashoek, M., Anderson, R.: Sybil-resistant DHT routing. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 305\u2013318. Springer, Heidelberg (2005)"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B., Dai, Y.: Uncovering social network sybils in the wild. In: Conference on Internet Measurement (2011)","DOI":"10.1145\/2068816.2068841"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th Annual Conference on Internet Measurement, pp. 35\u201347. ACM (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Cheng, Z., Sui, D.: Content-driven detection of campaigns in social media (2011)","DOI":"10.1145\/2063576.2063658"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Jin, X., Lin, C., Luo, J., Han, J.: A data mining-based spam detection system for social media networks. Proceedings of the VLDB Endowment 4(12) (2011)","DOI":"10.14778\/3402755.3402795"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1\u20139. ACM (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"28_CR12","unstructured":"Lee, K., Eoff, B., Caverlee, J.: Seven months with the devils: A long-term study of content polluters on twitter. In: Int\u2019l AAAI Conference on Weblogs and Social Media, ICWSM (2011)"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"C. Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 318\u2013337. Springer, Heidelberg (2011)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Yu, H., Gibbons, P., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 3\u201317. IEEE (2008)","DOI":"10.1109\/SP.2008.13"},{"key":"28_CR15","unstructured":"Danezis, G., Mittal, P.: Sybilinfer: Detecting sybil nodes using social networks. NDSS (2009)"},{"key":"28_CR16","unstructured":"Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 15\u201328. USENIX Association (2009)"},{"key":"28_CR17","unstructured":"Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. Technical Report (2011), http:\/\/www.cs.duke.edu\/~qiangcao\/publications\/sybilrank_tr.pdf"},{"key":"28_CR18","unstructured":"Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., Zhao, B.: Social turing tests: Crowdsourcing sybil detection. Arxiv preprint arXiv:1205.3856 (2012)"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: IEEE Symposium on Security and Privacy (2011)","DOI":"10.1109\/SP.2011.25"},{"key":"28_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-23496-5_13","volume-title":"Autonomic and Trusted Computing","author":"M. McCord","year":"2011","unstructured":"McCord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: Calero, J.M.A., Yang, L.T., M\u00e1rmol, F.G., Garc\u00eda Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol.\u00a06906, pp. 175\u2013186. Springer, Heidelberg (2011)"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Ahmed, F., Abulaish, M.: An mcl-based approach for spam profile detection in online social networks. In: The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, IEEE (2012)","DOI":"10.1109\/TrustCom.2012.83"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Blondel, V., Guillaume, J., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment 2008, 10008 (2008)","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"28_CR23","unstructured":"Blondel, V.: The Louvain method for community detection in large networks (2011), http:\/\/perso.uclouvain.be\/vincent.blondel\/research\/louvain.html (accessed July 11, 2012)"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37401-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,24]],"date-time":"2020-07-24T01:34:29Z","timestamp":1595554469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37401-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374005","9783642374012"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37401-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}