{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:49:43Z","timestamp":1769860183008,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/asonam.2014.6921573","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T20:12:38Z","timestamp":1414008758000},"page":"138-141","source":"Crossref","is-referenced-by-count":16,"title":["Behavioral detection of spam URL sharing: Posting patterns versus click patterns"],"prefix":"10.1109","author":[{"given":"Cheng","family":"Cao","sequence":"first","affiliation":[]},{"given":"James","family":"Caverlee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187928"},{"key":"17","article-title":"Large-scale automatic classification of phishing pages","author":"whittaker","year":"2010","journal-title":"NDSS"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963436"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"14","article-title":"WarningBird: Detecting suspicious urls in twitter stream","author":"lee","year":"2012","journal-title":"NDSS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277814"},{"key":"12","article-title":"Spam filtering in twitter using senderreceiver relationship","author":"song","year":"2011","journal-title":"RAID"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"20","article-title":"Detecting spammers on twitter","author":"benevenuto","year":"2010","journal-title":"CEAS"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045021"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068852"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"7","article-title":"Security and privacy implications of url shortening services","author":"neumann","year":"2010","journal-title":"W2SP"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963505"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030387"},{"key":"4","article-title":"Two years of short urls internet measurement: Security threats and countermeasures","author":"maggi","year":"2013","journal-title":"WWW"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"}],"event":{"name":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"China","start":{"date-parts":[[2014,8,17]]},"end":{"date-parts":[[2014,8,20]]}},"container-title":["2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6911097\/6921526\/06921573.pdf?arnumber=6921573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:53:55Z","timestamp":1490306035000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6921573\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/asonam.2014.6921573","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}