{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:13:23Z","timestamp":1762866803966},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"iSocial EU Marie Curie ITN","award":["FP7-PEOPLE-2012-ITN"],"award-info":[{"award-number":["FP7-PEOPLE-2012-ITN"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2018,3,1]]},"DOI":"10.1109\/tdsc.2016.2540637","type":"journal-article","created":{"date-parts":[[2016,3,10]],"date-time":"2016-03-10T19:28:24Z","timestamp":1457638104000},"page":"295-308","source":"Crossref","is-referenced-by-count":25,"title":["Risk Assessment in Social Networks Based on User Anomalous Behaviors"],"prefix":"10.1109","volume":"15","author":[{"given":"Naeimeh","family":"Laleh","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","volume":"77","author":"rajaraman","year":"2012","journal-title":"Mining of Massive Datasets"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413213"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"key":"ref32","article-title":"A categorization scheme for socialbot attacks in online social networks","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1027\/0044-3409.217.4.230"},{"key":"ref30","article-title":"Researchers make wormy twitter attack","author":"mcmillan","year":"2009"},{"key":"ref37","first-page":"663","article-title":"Efficient and scalable socware detection in online social networks","author":"rahman","year":"0","journal-title":"Proc Usenix Security Symp"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/13676261.2013.830702"},{"key":"ref35","article-title":"Teens ditch e-mail for texting and facebook","author":"murphy","year":"2010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-253-5"},{"key":"ref27","article-title":"The failure of online social network privacy settings","author":"madejski","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-4079(07)61835-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3115\/1600053.1600073"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.99"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488443"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPSI.2011.043730"},{"key":"ref21","article-title":"Sybil attacks vs identity clone attacks in online social networks","author":"jin","year":"0","journal-title":"Proceedings of the International Conference on Information Security and Assurance"},{"key":"ref24","article-title":"Social media and young adults","author":"lenhart","year":"2010","journal-title":"Pew Internet and American Life Project"},{"key":"ref23","first-page":"435","article-title":"Uncovering social spammers&#x2014;Social honeypots+ machine learning","author":"lee","year":"0","journal-title":"Proc Int ACM SIGIR Conf Res Develop Inf Retrieval"},{"key":"ref26","author":"maclennan","year":"2011","journal-title":"Data Mining with Microsoft SQL Server 2008"},{"key":"ref25","article-title":"New ways im going to hack your web app","author":"lundeen","year":"0","journal-title":"Blackhat AD"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923723"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342394"},{"key":"ref11","first-page":"765","article-title":"Viceroi catching click-spam in search ad networks","author":"dave","year":"0","journal-title":"Proc ACM SIGSAC Conf Comput Commun Security"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the em algorithm","author":"dempster","year":"1977","journal-title":"J Royal Statistical Society Series B (Methodological)"},{"key":"ref13","article-title":"Compa&#x2014;detecting compromised accounts on social networks","author":"egele","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403023"},{"key":"ref15","article-title":"Online social networks- threats and solutions","volume":"16","author":"fire","year":"2013","journal-title":"IEEE Commun Surv Tutorials"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809292"},{"key":"ref17","first-page":"35","article-title":"Detecting and characterizing social spam campaigns","author":"gao","year":"0","journal-title":"Proc 10th ACM SIGCOMM Conf Internet Meas"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492568"},{"key":"ref3","first-page":"551","article-title":"All your contacts are belong to us automated identity theft attacks on social networks","author":"bilge","year":"0","journal-title":"Proc 18th Int Conf World Wide Web"},{"key":"ref6","first-page":"93","article-title":"The socialbot network&#x2014;When bots socialize for fame and money","author":"boshmaf","year":"0","journal-title":"Proc 27th Annu Comput Security Appl Conf"},{"key":"ref5","first-page":"8","article-title":"&#x00CD;ntegro: Leveraging victim prediction for robust fake account detection in OSNs","author":"boshmaf","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref8","first-page":"197","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"0","journal-title":"Proc 9th USENIX Conf Netw Syst Design Implementation"},{"key":"ref7","article-title":"Scaling em (expectation-maximization) clustering to large databases","author":"bradley","year":"0"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"ref9","article-title":"Sybilinfer&#x2014;detecting sybil nodes using social networks","author":"danezis","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref46","first-page":"363","article-title":"An analysis of social network-based sybil defenses","volume":"41","author":"viswanath","year":"2011","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"ref45","first-page":"223","article-title":"Towards detecting anomalous user behavior in online social networks","author":"viswanath","year":"0","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2556609"},{"key":"ref47","first-page":"241","article-title":"You are how you click- clickstream analysis for sybil detection","author":"wang","year":"0","journal-title":"Proc 22nd USENIX Conf Security"},{"key":"ref42","first-page":"635","article-title":"Your botnet is my botnet analysis of a botnet takeover","author":"gross","year":"0","journal-title":"Proc 16th ACM Conf Comput Commun Security"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.141537"},{"key":"ref44","first-page":"15","article-title":"Sybil-resilient online content voting","author":"tran","year":"0","journal-title":"Proc 6th USENIX Symp Netw Syst Design Implementation"},{"key":"ref43","first-page":"479","article-title":"Unik&#x2014;unsupervised social network spam detection","author":"tan","year":"0","journal-title":"Proc ACM Int Conf Inf Knowl Manag"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/8314283\/07430280.pdf?arnumber=7430280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:25:50Z","timestamp":1642004750000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7430280\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,1]]},"references-count":50,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2016.2540637","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2018,3,1]]}}}