{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:33:23Z","timestamp":1773322403229,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T00:00:00Z","timestamp":1286150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,4]]},"DOI":"10.1145\/1866307.1866311","type":"proceedings-article","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T14:38:23Z","timestamp":1286289503000},"page":"27-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":359,"title":["@spam"],"prefix":"10.1145","author":[{"given":"Chris","family":"Grier","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Kurt","family":"Thomas","sequence":"additional","affiliation":[{"name":"University of Illinois, Champaign-Urbana, Urbana, IL, USA"}]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Michael","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security","author":"Anderson D.","year":"2007","unstructured":"}} D. Anderson , C. Fleizach , S. Savage , and G. Voelker . Spamscatter: Characterizing internet scam hosting infrastructure . In USENIX Security , 2007 . }}D. Anderson, C. Fleizach, S. Savage, and G. Voelker. Spamscatter: Characterizing internet scam hosting infrastructure. In USENIX Security, 2007."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 4th International Conference on Weblogs and Social Media","author":"Cha M.","year":"2010","unstructured":"}} M. Cha , H. Haddadi , F. Benevenuto , and K. Gummadi . Measuring User Influence in Twitter: The Million Follower Fallacy . In Proceedings of the 4th International Conference on Weblogs and Social Media , 2010 . }}M. Cha, H. Haddadi, F. Benevenuto, and K. Gummadi. Measuring User Influence in Twitter: The Million Follower Fallacy. In Proceedings of the 4th International Conference on Weblogs and Social Media, 2010."},{"key":"e_1_3_2_1_3_1","unstructured":"}}A. Chowdhury. State of Twitter spam. http:\/\/blog.twitter.com\/2010\/03\/state-of-twitter-spam.html March 2010.  }}A. Chowdhury. State of Twitter spam. http:\/\/blog.twitter.com\/2010\/03\/state-of-twitter-spam.html March 2010."},{"key":"e_1_3_2_1_4_1","unstructured":"}}F-Secure. Twitter now filtering malicious URLs. http:\/\/www.f-secure.com\/weblog\/archives\/00001745.html 2009.  }}F-Secure. Twitter now filtering malicious URLs. http:\/\/www.f-secure.com\/weblog\/archives\/00001745.html 2009."},{"key":"e_1_3_2_1_5_1","unstructured":"}}R. Flores. The real face of Koobface. http:\/\/blog.trendmicro.com\/the-real-face-of-koobface\/ August 2009.  }}R. Flores. The real face of Koobface. http:\/\/blog.trendmicro.com\/the-real-face-of-koobface\/ August 2009."},{"key":"e_1_3_2_1_6_1","unstructured":"}}Google. Google safebrowsing API. http:\/\/code.google.com\/apis\/safebrowsing\/ 2010.  }}Google. Google safebrowsing API. http:\/\/code.google.com\/apis\/safebrowsing\/ 2010."},{"key":"e_1_3_2_1_7_1","unstructured":"}}D. Harvey. Trust and safety. http:\/\/blog.twitter.com\/2010\/03\/trust-and-safety.html March 2010.  }}D. Harvey. Trust and safety. http:\/\/blog.twitter.com\/2010\/03\/trust-and-safety.html March 2010."},{"key":"e_1_3_2_1_8_1","unstructured":"}}D. Ionescu. Twitter Warns of New Phishing Scam. http:\/\/www.pcworld.com\/article\/174660\/twitter_warns _of_new_phishing_scam.html October 2009.  }}D. Ionescu. Twitter Warns of New Phishing Scam. http:\/\/www.pcworld.com\/article\/174660\/twitter_warns _of_new_phishing_scam.html October 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 4th International Conference on Weblogs and Social Media","author":"Irani D.","year":"2010","unstructured":"}} D. Irani , S. Webb , and C. Pu . Study of static classification of social spam profiles in MySpace . In Proceedings of the 4th International Conference on Weblogs and Social Media , 2010 . }}D. Irani, S. Webb, and C. Pu. Study of static classification of social spam profiles in MySpace. In Proceedings of the 4th International Conference on Weblogs and Social Media, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1558977.1558997"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_1_14_1","unstructured":"}}R. McMillan. Stolen Twitter accounts can fetch $1 000. http:\/\/www.computerworld.com\/s\/article\/9150001\/Stolen_ Twitter_accounts_can_fetch_1_000 2010.  }}R. McMillan. Stolen Twitter accounts can fetch $1 000. http:\/\/www.computerworld.com\/s\/article\/9150001\/Stolen_ Twitter_accounts_can_fetch_1_000 2010."},{"key":"e_1_3_2_1_15_1","volume-title":"Web 2.0 Security and Privacy","author":"Meeder B.","year":"2010","unstructured":"}} B. Meeder , J. Tam , P. G. Kelley , and L. F. Cranor . RT @IWantPrivacy: Widespread violation of privacy settings in the Twitter social network . In Web 2.0 Security and Privacy , 2010 . }}B. Meeder, J. Tam, P. G. Kelley, and L. F. Cranor. RT @IWantPrivacy: Widespread violation of privacy settings in the Twitter social network. In Web 2.0 Security and Privacy, 2010."},{"key":"e_1_3_2_1_16_1","unstructured":"}}J. O'Dell. Twitter hits 2 billion tweets per month. http:\/\/mashable.com\/2010\/06\/08\/twitter-hits-2-billion- tweets-per-month\/ June 2010.  }}J. O'Dell. Twitter hits 2 billion tweets per month. http:\/\/mashable.com\/2010\/06\/08\/twitter-hits-2-billion- tweets-per-month\/ June 2010."},{"key":"e_1_3_2_1_17_1","volume-title":"Botnet Judo: Fighting spam with itself","author":"Pitsillidis A.","year":"2010","unstructured":"}} A. Pitsillidis , K. Levchenko , C. Kreibich , C. Kanich , G. Voelker , V. Paxson , N. Weaver , and S. Savage . Botnet Judo: Fighting spam with itself . 2010 . }}A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. Voelker, V. Paxson, N. Weaver, and S. Savage. Botnet Judo: Fighting spam with itself. 2010."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Qian Z.","year":"2010","unstructured":"}} Z. Qian , Z. Mao , Y. Xie , and F. Yu . On network-level clusters for spam detection . In Proceedings of the Network and Distributed System Security Symposium (NDSS) , 2010 . }}Z. Qian, Z. Mao, Y. Xie, and F. Yu. On network-level clusters for spam detection. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2010."},{"key":"e_1_3_2_1_20_1","unstructured":"}}E. Schonfeld. When it comes to URL shoteners bit.ly is now the biggest. http:\/\/techcrunch.com\/2009\/05\/07\/when-it- comes-to-url-shorteners-bitly-is-now-the-biggest\/ May 2009.  }}E. Schonfeld. When it comes to URL shoteners bit.ly is now the biggest. http:\/\/techcrunch.com\/2009\/05\/07\/when-it- comes-to-url-shorteners-bitly-is-now-the-biggest\/ May 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"The Koobface botnet and the rise of social malware. Technical report","author":"Thomas K.","year":"2010","unstructured":"}} K. Thomas and D. M. Nicol . The Koobface botnet and the rise of social malware. Technical report , University of Illinois at Urbana-Champaign , July 2010 . https:\/\/www.ideals.illinois.edu\/handle\/2142\/16598. }}K. Thomas and D. M. Nicol. The Koobface botnet and the rise of social malware. Technical report, University of Illinois at Urbana-Champaign, July 2010. https:\/\/www.ideals.illinois.edu\/handle\/2142\/16598."},{"key":"e_1_3_2_1_22_1","unstructured":"}}Twitter. The Twitter rules. http:\/\/help.twitter.com\/forums\/26257\/entries\/18311 2009.  }}Twitter. The Twitter rules. http:\/\/help.twitter.com\/forums\/26257\/entries\/18311 2009."},{"key":"e_1_3_2_1_23_1","volume-title":"http:\/\/uribl.com\/","author":"BL.","year":"2010","unstructured":"}}URI BL. URIBL.COM -- realtime URI blacklist. http:\/\/uribl.com\/ , 2010 . }}URIBL. URIBL.COM -- realtime URI blacklist. http:\/\/uribl.com\/, 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242612"},{"key":"e_1_3_2_1_25_1","unstructured":"}}J. Wein. Joewein.de LLC -- fighting spam and scams on the Internet. http:\/\/www.joewein.net\/.  }}J. Wein. Joewein.de LLC -- fighting spam and scams on the Internet. http:\/\/www.joewein.net\/."},{"key":"e_1_3_2_1_26_1","volume-title":"March","author":"Wisniewski C.","year":"2010","unstructured":"}} C. Wisniewski . Twitter hack demonstrates the power of weak passwords. http:\/\/www.sophos.com\/blogs\/chetw\/g\/2010\/03\/07\/twitter- hack-demonstrates-power-weak-passwords\/ , March 2010 . }}C. Wisniewski. Twitter hack demonstrates the power of weak passwords. http:\/\/www.sophos.com\/blogs\/chetw\/g\/2010\/03\/07\/twitter- hack-demonstrates-power-weak-passwords\/, March 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402979"}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","location":"Chicago Illinois USA","acronym":"CCS '10","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 17th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866311","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866307.1866311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:09:06Z","timestamp":1750248546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866311"}},"subtitle":["the underground on 140 characters or less"],"short-title":[],"issued":{"date-parts":[[2010,10,4]]},"references-count":26,"alternative-id":["10.1145\/1866307.1866311","10.1145\/1866307"],"URL":"https:\/\/doi.org\/10.1145\/1866307.1866311","relation":{},"subject":[],"published":{"date-parts":[[2010,10,4]]},"assertion":[{"value":"2010-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}