{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T14:51:19Z","timestamp":1770907879523,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/malware.2010.5665793","type":"proceedings-article","created":{"date-parts":[[2010,12,21]],"date-time":"2010-12-21T18:39:39Z","timestamp":1292956779000},"page":"63-70","source":"Crossref","is-referenced-by-count":71,"title":["The Koobface botnet and the rise of social malware"],"prefix":"10.1109","author":[{"given":"Kurt","family":"Thomas","sequence":"first","affiliation":[]},{"given":"David M.","family":"Nicol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"ref11","article-title":"Worm spreads on Facebook, hijacks users&#x2019; clicks","author":"keizer","year":"2008","journal-title":"ComputerWorld"},{"key":"ref12","article-title":"Trick or Tweet? Malware Abundant in Twitter URLs","author":"kim","year":"2009","journal-title":"Wired"},{"key":"ref13","article-title":"On the spam campaign trail","author":"kreibich","year":"2008","journal-title":"Workshop on Large-Scale Exploits and Emergent Threats (LEET08)"},{"key":"ref14","article-title":"Facebook hit by phishing attacks for a second day","author":"mills","year":"2009","journal-title":"CNET News"},{"key":"ref15","article-title":"Botnet Judo: Fighting Spam with Itself","author":"pitsillidis","year":"2010","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref16","article-title":"Twitter Reaches 44.5 Million People Worldwide In June (comScore)","author":"schonfeld","year":"2009","journal-title":"TechCrunch"},{"key":"ref17","article-title":"Facebook Joins With McAfee to Clean Spam From Site","author":"stone","year":"2010","journal-title":"New York Times"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"ref19","year":"2009","journal-title":"The Twitter Rules"},{"key":"ref4","author":"baltazar","year":"2009","journal-title":"The Heart of Koobface C&C and Social Network Propagation"},{"key":"ref3","article-title":"Spam-scatter: Characterizing internet scam hosting infrastructure","author":"anderson","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"ref6","author":"dancho","year":"2009","journal-title":"Dissecting Koobface Worm's Twitter Campaign"},{"key":"ref5","year":"2009","journal-title":"Spam and Malware Protection"},{"key":"ref8","article-title":"Twitter Warns of New Phishing Scam","author":"ionescu","year":"2009","journal-title":"PCWorld"},{"key":"ref7","year":"2009","journal-title":"Statistics"},{"key":"ref2","year":"2009","journal-title":"Koobface the social network trojan"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"ref9","article-title":"Studying spamming botnets using Botlab","author":"john","year":"2009","journal-title":"Networked Systems Design and Implementation (NSDI)"},{"key":"ref20","first-page":"232","article-title":"Automatically generating models for botnet detection","author":"wurzinger","year":"2010","journal-title":"ESORICS"}],"event":{"name":"2010 5th International Conference on Malicious and Unwanted Software (MALWARE)","location":"Nancy, France","start":{"date-parts":[[2010,10,19]]},"end":{"date-parts":[[2010,10,20]]}},"container-title":["2010 5th International Conference on Malicious and Unwanted Software"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5655114\/5665785\/05665793.pdf?arnumber=5665793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:02:52Z","timestamp":1490079772000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5665793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/malware.2010.5665793","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}