{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:51:38Z","timestamp":1767034298136,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,2,21]],"date-time":"2011-02-21T00:00:00Z","timestamp":1298246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,2,21]]},"DOI":"10.1145\/1943513.1943520","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"27-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Towards active detection of identity clone attacks on online social networks"],"prefix":"10.1145","author":[{"given":"Lei","family":"Jin","sequence":"first","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Hassan","family":"Takabi","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"James B.D.","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,2,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_2_1","unstructured":"Facebook Factsheet {Online}. http:\/\/www.facebook.com\/press\/info.php?statistics.  Facebook Factsheet {Online}. http:\/\/www.facebook.com\/press\/info.php?statistics."},{"key":"e_1_3_2_1_3_1","unstructured":"Wikipedia. Social network {Online}. http:\/\/en.wikipedia.org\/wiki\/Social_network.  Wikipedia. Social network {Online}. http:\/\/en.wikipedia.org\/wiki\/Social_network."},{"key":"e_1_3_2_1_4_1","unstructured":"Identity Badge {Online}. http:\/\/apps.facebook.com\/identity_badge  Identity Badge {Online}. http:\/\/apps.facebook.com\/identity_badge"},{"key":"e_1_3_2_1_5_1","unstructured":"mysafeFriend {Online}. http:\/\/apps.facebook.com\/mysafefriend  mysafeFriend {Online}. http:\/\/apps.facebook.com\/mysafefriend"},{"key":"e_1_3_2_1_6_1","unstructured":"FightIDTheft {Online}. http:\/\/www.facebook.com\/FightIDTheft  FightIDTheft {Online}. http:\/\/www.facebook.com\/FightIDTheft"},{"key":"e_1_3_2_1_7_1","unstructured":"Facebook Identity Theft - Don't be a Victim! {Online}. http:\/\/www.facebook.com\/group.php?gid=7086517815  Facebook Identity Theft - Don't be a Victim! {Online}. http:\/\/www.facebook.com\/group.php?gid=7086517815"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081956"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526796"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100606"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1651587.1651604"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242591"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367516"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"}],"event":{"name":"CODASPY '11: First ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio TX USA","acronym":"CODASPY '11"},"container-title":["Proceedings of the first ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1943513.1943520","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1943513.1943520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:39Z","timestamp":1750243959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1943513.1943520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,21]]},"references-count":16,"alternative-id":["10.1145\/1943513.1943520","10.1145\/1943513"],"URL":"https:\/\/doi.org\/10.1145\/1943513.1943520","relation":{},"subject":[],"published":{"date-parts":[[2011,2,21]]},"assertion":[{"value":"2011-02-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}