{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T12:09:34Z","timestamp":1771502974889,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/dsn.2019.00052","type":"proceedings-article","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T23:46:58Z","timestamp":1566517618000},"page":"435-446","source":"Crossref","is-referenced-by-count":7,"title":["Pseudo-Honeypot: Toward Efficient and Scalable Spam Sniffer"],"prefix":"10.1109","author":[{"given":"Yihe","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Nian-Feng","family":"Tzeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.02.047"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664258"},{"key":"ref33","year":"2019","journal-title":"Twitter The Twitter Rules"},{"key":"ref32","year":"2019","journal-title":"Twitter Developer agreement and policy"},{"key":"ref31","year":"2018","journal-title":"Twitter Update on twitter's review of the 2016 u s election"},{"key":"ref30","first-page":"195","article-title":"Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse","author":"thomas","year":"0","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402979"},{"key":"ref35","article-title":"You are how you click: Clickstream analysis for sybil detection","volume":"9","author":"wang","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref34","first-page":"1951","article-title":"When social bots attack: Modeling susceptibility of users in online social networks","volume":"2","author":"wagner","year":"2012","journal-title":"Making Sense of Microposts"},{"key":"ref10","article-title":"Compa: Detecting compromised accounts on social networks","author":"egele","year":"0","journal-title":"Proceedings of the NDSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788606"},{"key":"ref12","article-title":"Towards online spam filtering in social networks","volume":"12","author":"gao","year":"0","journal-title":"Proceedings of the NDSS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2789187.2789206"},{"key":"ref14","article-title":"For election day influence, twitter ruled social media","author":"isaac","year":"2016","journal-title":"The New York Times"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.55"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"ref17","first-page":"185","article-title":"Seven months with the devils: A long-term study of content polluters on twitter","author":"lee","year":"0","journal-title":"Proceedings of the ICWSM"},{"key":"ref18","article-title":"Warningbird: Detecting suspicious urls in twitter stream","volume":"12","author":"lee","year":"0","journal-title":"Proceedings of the NDSS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613719"},{"key":"ref28","author":"suryawanshi","year":"2018","journal-title":"Image recognition Detection of nearly duplicate images"},{"key":"ref4","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"0","journal-title":"Proceedings of the 4th USENIX Conference on Networked Systems Design and Implementation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2621888"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0182487"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249453"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2014.133"},{"key":"ref9","article-title":"Hashtag analytics for your brand, business, product, service, event or blog","author":"corporation","year":"2018"},{"key":"ref1","first-page":"12","article-title":"Detecting spammers on twitter","volume":"6","author":"benevenuto","year":"0","journal-title":"Proceedings of the Conference on Annual Collaboration Electronic Messaging Anti-Abuse and Spam (CEAS)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3325-4_1"},{"key":"ref22","first-page":"638","article-title":"A security approach for social networks based on honeypots","author":"nisrine","year":"2016","journal-title":"IEEE International Colloquium on Information Science and Technology (CiSt)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767701"},{"key":"ref23","first-page":"3687","article-title":"Learning to identify concise regular expressions that describe email campaigns","volume":"16","author":"prasse","year":"2015","journal-title":"The Journal of Machine Learning Research"},{"key":"ref26","first-page":"886","article-title":"In defense of minhash over simhash","author":"shrivastava","year":"2014","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2773581"}],"event":{"name":"2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","location":"Portland, OR, USA","start":{"date-parts":[[2019,6,24]]},"end":{"date-parts":[[2019,6,27]]}},"container-title":["2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8790390\/8809485\/08809491.pdf?arnumber=8809491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:36:35Z","timestamp":1658158595000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8809491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/dsn.2019.00052","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}