{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T17:52:06Z","timestamp":1769536326775,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/comsnets.2013.6465541","type":"proceedings-article","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T08:29:54Z","timestamp":1362126594000},"page":"1-10","source":"Crossref","is-referenced-by-count":67,"title":["CATS: Characterizing automation of Twitter spammers"],"prefix":"10.1109","author":[{"given":"Amit A.","family":"Amleshwaram","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Texas A&amp;M University, College Station, TX - 77843"}]},{"given":"Narasimha","family":"Reddy","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Texas A&amp;M University, College Station, TX - 77843"}]},{"given":"Sandeep","family":"Yadav","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Texas A&amp;M University, College Station, TX - 77843"}]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Texas A&amp;M University, College Station, TX - 77843"}]},{"given":"Chao","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Texas A&amp;M University, College Station, TX - 77843"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2793"},{"key":"35","article-title":"Towards online spam filtering in social networks","author":"gao","year":"2012","journal-title":"Proc of 19th Network & Distributed System Security Symposium (NDSS)"},{"key":"17","article-title":"Brenes. Overcoming spammers in twitter a tale of five algorithms","author":"gayo-avello","year":"2010","journal-title":"Spanish Conference on Information Retrieval (CERI)"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"18","article-title":"Detecting spammers on twitter","author":"fabricio","year":"2010","journal-title":"Collaboration Electronic Messaging Anti-Abuse and Spam Conference"},{"key":"33","article-title":"Understanding the network-level behavior of spammers","author":"anirudh","year":"2006","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"15","article-title":"Filtering spam with behavioral blacklisting","author":"ramachandran","year":"2007","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"34","article-title":"All your iFRAMEs point to Us","author":"niels","year":"2008","journal-title":"ACM Security Symposium"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2009.5072127"},{"key":"14","article-title":"Hector Combating spam in tagging systems","author":"georgia","year":"2007","journal-title":"Tl Workshop on Adversarial Information Retrieval on the Web (AIRWeb07)"},{"key":"11","article-title":"Die Free or Live Hard empirical evaluation and new design for fighting evolving twitter spammers","author":"chao","year":"2011","journal-title":"Recent Advances in Intrusion Detection (RAID)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-23644-0_16","article-title":"Spam filtering in twitter using sender-receiver relationship","author":"song","year":"2011","journal-title":"Recent Advances in Intrusion Detection (RAID)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"23","article-title":"Dont follow me: Spam detection on twitter","author":"hai wang","year":"2010","journal-title":"Proceedings of 5th InInternational Conference on Security and Cryptography (SECRYPT)"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644900"},{"key":"26","author":"chu","year":"2010","journal-title":"Who Is Tweeting on Twitter Human Bot or Cyborg in Annual Computer Security Applications Conference (ACSAC)"},{"key":"27","article-title":"WARNING bird detecting suspicious urls in twitter stream","author":"lee","year":"2012","journal-title":"Network & Distributed System Security (NDSS)"},{"key":"28","article-title":"Detecting and characterizing social spam campaigns","author":"hongyu","year":"2010","journal-title":"ACM Internet Measurement Conference"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"3","year":"2011"},{"key":"2","author":"nazario","year":"2011","journal-title":"Twitter Based Botnet C&C"},{"key":"10","year":"0"},{"key":"1","year":"0"},{"key":"30","article-title":"Toward worm detection in online social networks","author":"wei","year":"2010","journal-title":"Proceedings of the 26th Annual Computer Security Applications Conference"},{"key":"7","year":"0"},{"key":"6","year":"0"},{"key":"32","article-title":"Detecting Spammers with SNARE: Spatio-temporal network-level automatic reputation engine","author":"hao","year":"2009","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"5","year":"0"},{"key":"31","article-title":"Bias: Measuring the tweeting behavior of propagandists","author":"lumezanu","year":"2012","journal-title":"Proceedings of the AAAI InInternational Conference on Weblogs and Social Media (ICWSM)"},{"key":"4","year":"0"},{"key":"9","year":"0"},{"key":"8","year":"0"}],"event":{"name":"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)","location":"Bangalore, India","start":{"date-parts":[[2013,1,7]]},"end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6451320\/6465521\/06465541.pdf?arnumber=6465541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T05:05:22Z","timestamp":1769490322000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6465541\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2013.6465541","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}