{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T15:01:12Z","timestamp":1760367672077,"version":"3.41.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,5,2]],"date-time":"2016-05-02T00:00:00Z","timestamp":1462147200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003593","name":"CNPq","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002322","name":"CAPES","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004901","name":"Fapemig","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004901","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s13278-016-0331-3","type":"journal-article","created":{"date-parts":[[2016,5,2]],"date-time":"2016-05-02T15:14:26Z","timestamp":1462202066000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An empirical study of socialbot infiltration strategies in the Twitter social network"],"prefix":"10.1007","volume":"6","author":[{"given":"Carlos","family":"Freitas","sequence":"first","affiliation":[]},{"given":"Fabr\u00edcio","family":"Benevenuto","sequence":"additional","affiliation":[]},{"given":"Adriano","family":"Veloso","sequence":"additional","affiliation":[]},{"given":"Saptarshi","family":"Ghosh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,2]]},"reference":[{"key":"331_CR1","unstructured":"46 % of Twitter users have less than 100 followers-Simplify360 (2014) http:\/\/simplify360.com\/blog\/46-of-twitter-users-have-less-than-100-followers\/ . Accessed 1 May 2014"},{"key":"331_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad MA, Ahmed I, Srivastava J, Poole MS (2011) Trust me, i\u2019m an expert: trust, homophily and expertise in mmos. In: International conference on privacy, security, risk and trust (passat) and international conference on social computing (socialcom), pp\u00a0882\u2013887","DOI":"10.1109\/PASSAT\/SocialCom.2011.207"},{"key":"331_CR3","unstructured":"Aiello LM, Deplano M, Schifanella R, Ruffo G (2012) People are strange when you\u2019re a stranger: impact and influence of bots on social networks. In: Proceedings of AAAI international conference on web and social media (ICWSM)"},{"key":"331_CR4","doi-asserted-by":"crossref","unstructured":"Barbieri G, Pachet F, Roy P, Esposti MD (2012) Markov constraints for generating lyrics with style. In: Proceedings of European conference on artificial intelligence","DOI":"10.3233\/978-1-61499-098-7-115"},{"key":"331_CR5","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In: Proceedings of annual collaboration, electronic messaging, anti-abuse and spam conference (CEAS)"},{"key":"331_CR6","doi-asserted-by":"crossref","unstructured":"Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M (2011) The socialbot network: when bots socialize for fame and money. In: Proceedings of annual computer security applications conference (ACSAC)","DOI":"10.1145\/2076732.2076746"},{"key":"331_CR7","doi-asserted-by":"crossref","unstructured":"Cha M, Haddadi H, Benevenuto F, Gummadi KP (2010) Measuring user influence in twitter: the million follower fallacy. In: Proceedings of AAAI international conference on web and social media (ICWSM)","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"331_CR8","doi-asserted-by":"crossref","unstructured":"Chandra J, Scholtes I, Ganguly N, Schweitzer F (2012) A tunable mechanism for identifying trusted nodes in large scale distributed networks. In: Proceedings of IEEE international conference on trust, security and privacy in computing and communications (TRUSTCOM), pp 722\u2013729","DOI":"10.1109\/TrustCom.2012.63"},{"key":"331_CR9","doi-asserted-by":"crossref","unstructured":"Chhabra S, Aggarwal A, Benevenuto F, Kumaraguru P (2011) Phi.sh\/SoCiaL: The phishing landscape through short URLs. In: Proceedings of collaboration, electronic messaging, anti-abuse and spam conference (CEAS)","DOI":"10.1145\/2030376.2030387"},{"issue":"6","key":"331_CR10","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput 9(6):811\u2013824","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"331_CR11","unstructured":"Coburn Z, Marra G (2008) Realboy: believable twitter Bots. http:\/\/ca.olin.edu\/2008\/realboy\/ . Accessed 1 Dec 2015"},{"key":"331_CR12","unstructured":"Creating a bot on wikipedia (2015) http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Creating_a_bot . Accessed 1 Dec 2015"},{"key":"331_CR13","unstructured":"Edwards J (2013) There are 20 million fake users on twitter, and twitter can\u2019t do much about them\u2014business insider. http:\/\/tinyurl.com\/twitter-20M-fake-users . Accessed 1 Dec 2013"},{"key":"331_CR14","unstructured":"Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2014) The rise of social bots. arXiv:1407.5225"},{"key":"331_CR15","doi-asserted-by":"crossref","unstructured":"Freitas C, Benevenuto F, Ghosh S, Veloso A (2015) Reverse engineering socialbot infiltration strategies in twitter. In: Proceedings of ACM\/IEEE international conference on advances in social networks analysis and mining (ASONAM)","DOI":"10.1145\/2808797.2809292"},{"key":"331_CR16","doi-asserted-by":"crossref","unstructured":"Ghosh S, Viswanath B, Kooti F, Sharma NK, Korlam G, Benevenuto F, Gummadi, K. P. (2012) Understanding and combating link farming in the twitter social network. In: Proceedings of World Wide Web Conference (WWW)","DOI":"10.1145\/2187836.2187846"},{"key":"331_CR17","doi-asserted-by":"crossref","unstructured":"Ghosh S, Zafar MB, Bhattacharya P, Sharma N, Ganguly N, Gummadi K (2013) On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream. In: Proceedings of ACM conference on information knowledge management (CIKM)","DOI":"10.1145\/2505515.2505615"},{"key":"331_CR18","unstructured":"Gy\u00f6ngyi Z, Garcia-Molina H (2005) Link spam alliances. In: Proceedings of international conference on very large data bases (VLDB)"},{"key":"331_CR19","volume-title":"The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling","author":"R Jain","year":"1991","unstructured":"Jain R (1991) The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling. Wiley, London"},{"key":"331_CR20","volume-title":"Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition","author":"D Jurafsky","year":"2000","unstructured":"Jurafsky D, Martin JH (2000) Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 1st edn. Prentice Hall PTR, Englewood Cliffs","edition":"1"},{"key":"331_CR21","unstructured":"Klout\u2014The standard for influence (2015) http:\/\/klout.com\/ . Accessed 1 Dec 2015"},{"key":"331_CR22","unstructured":"Klout\u2014wikipedia (2015) http:\/\/en.wikipedia.org\/wiki\/Klout . Accessed 1 Dec 2015"},{"key":"331_CR23","unstructured":"Kouloumpis E, Wilson T, Moore J (2011) Twitter sentiment analysis: the good, the bad and the OMG! In: Proceedings of AAAI international conference on web and social media (ICWSM)"},{"key":"331_CR24","doi-asserted-by":"crossref","unstructured":"Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: social honeypots + machine learning. In: Proceedings ACM SIGIR conference on research and development in information retrieval (SIGIR)","DOI":"10.1145\/1835449.1835522"},{"key":"331_CR25","unstructured":"Lee K, Eoff BD, Caverlee J (2011) Seven months with the devils: a long-term study of content polluters on twitter. In: Proceedings of AAAI international conference on web and social media (ICWSM)"},{"key":"331_CR26","unstructured":"Let\u2019s make candidates pledge not to use bots (2014) http:\/\/blogs.reuters.com\/great-debate\/2014\/01\/02\/lets-make-candidates-pledge-not-to-use-bots\/ . Accessed 1 Dec 2015"},{"key":"331_CR27","doi-asserted-by":"crossref","unstructured":"Messias J, Schmidt L, Rabelo R, Benevenuto F (2013) You followed my bot! Transforming robots into influential users in Twitter. First Monday 18(7) http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/4217","DOI":"10.5210\/fm.v18i7.4217"},{"key":"331_CR28","unstructured":"Orcutt M (2012) Twitter mischief plagues Mexico\u2019s election. http:\/\/www.technologyreview.com\/news\/428286\/twitter-mischief-plagues-mexicos-election\/ . Accessed 1 Dec 2015"},{"key":"331_CR29","unstructured":"Pandora Bots (2015) http:\/\/www.pandorabots.com\/ . Accessed 1 Dec 2015"},{"key":"331_CR30","unstructured":"Pitsillidis A, Levchenko K, Kreibich C, Kanich C, Voelker GM, Paxson, V, Weaver N, Savage S (2010) Botnet judo: fighting spam with itself. In: Proceedings of symposium on network and distributed system security (NDSS), San Diego, CA"},{"key":"331_CR31","doi-asserted-by":"crossref","unstructured":"Ratkiewicz J, Conover M, Meiss M, Gon\u00e7alves B, Patil S, Flammini A, Menczer F (2011) Truthy: mapping the spread of astroturf in microblog streams . In: Proceedings of World Wide Web Conference (WWW)","DOI":"10.1145\/1963192.1963301"},{"key":"331_CR32","doi-asserted-by":"crossref","unstructured":"Roy A, Ahmad MA, Sarkar C, Keegan B, Srivastava J (2012) The ones that got away: false negative estimation based approaches for gold farmer detection. In: International conference on privacy, security, empirical study of socialbots in twitter 27 risk and trust (passat) and international conference on social computing (socialcom), pp 328\u2013337)","DOI":"10.1109\/SocialCom-PASSAT.2012.125"},{"key":"331_CR33","unstructured":"Shane S, Hubbard B (2014) ISIS displaying a deft command of varied media. http:\/\/www.nytimes.com\/2014\/08\/31\/world\/middleeast\/isis-displaying-a-deft-command-of-varied-media.html . Accessed 1 Dec 2015"},{"key":"331_CR34","unstructured":"Shutting down spammers (2012) https:\/\/blog.twitter.com\/2012\/shutting-down-spammers . Accessed 1 Dec 2015"},{"key":"331_CR35","unstructured":"Stone-Gross B, Holz T, Stringhini G, Vigna G (2011) The underground economy of spam: a Botmaster\u2019s perspective of coordinating large-scale spam campaigns. In: Proceedings of USENIX conference on large- scale exploits and emergent threats (LEET)"},{"key":"331_CR36","doi-asserted-by":"crossref","unstructured":"Subrahmanian VS, Azaria A, Durst S, Kagan V, Galstyan A, Lerman K, Waltzman R et al. (2016) The DARPA twitter bot challenge. arXiv:1601.05140","DOI":"10.1109\/MC.2016.183"},{"key":"331_CR37","unstructured":"The twitter rules\u2014twitter help center (2015) https:\/\/support.twitter.com\/articles\/18311# . Accessed 1 Dec 2015"},{"issue":"4","key":"331_CR38","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/1851275.1851226","volume":"40","author":"B Viswanath","year":"2010","unstructured":"Viswanath B, Post A, Gummadi KP, Mislove A (2010a) An analysis of social network-based Sybil defenses. ACM SIGCOMM Comput Commun Rev 40(4):363\u2013374","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"4","key":"331_CR39","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/1851275.1851226","volume":"40","author":"B Viswanath","year":"2010","unstructured":"Viswanath B, Post A, Gummadi KP, Mislove A (2010b) An analysis of social network-based sybil defenses. SIGCOMM Comput Commun Rev 40(4):363\u2013374","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"331_CR40","doi-asserted-by":"crossref","unstructured":"Wagner C, Liao V, Pirolli P, Nelson L, Strohmaier M (2012) It\u2019s not in their tweets: modeling topical expertise of twitter users. In: Proceedings of AASE\/IEEE international conference on social computing (SocialCom)","DOI":"10.1109\/SocialCom-PASSAT.2012.30"},{"key":"331_CR41","unstructured":"Wagner C, Mitter S, K\u00f6rner C, Strohmaier M (2012) When social bots attack: modeling susceptibility of users in online social networks. In: Proceedings of workshop on making sense of microposts (with WWW)"},{"key":"331_CR42","doi-asserted-by":"crossref","unstructured":"Wald R, Khoshgoftaar TM, Napolitano A, Sumner C (2013) Which users reply to and interact with twitter social bots? In: Proceedings of IEEE conference on tools with artificial intelligence (ICTAI)","DOI":"10.1109\/ICTAI.2013.30"},{"key":"331_CR43","unstructured":"Web Ecology Project (2015) http:\/\/www.webecologyproject.org\/"},{"key":"331_CR44","doi-asserted-by":"crossref","unstructured":"William R, Avison JDM (eds) BAP (2007) Mental health, social mirror. Springer, Berlin","DOI":"10.1007\/978-0-387-36320-2"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0331-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-016-0331-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0331-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0331-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T23:47:09Z","timestamp":1748908029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-016-0331-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,2]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["331"],"URL":"https:\/\/doi.org\/10.1007\/s13278-016-0331-3","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2016,5,2]]},"article-number":"23"}}