{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T14:29:38Z","timestamp":1774189778546,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T00:00:00Z","timestamp":1300752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,22]]},"DOI":"10.1145\/1966913.1966939","type":"proceedings-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T09:36:11Z","timestamp":1302168971000},"page":"196-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Malware propagation in online social networks"],"prefix":"10.1145","author":[{"given":"Guanhua","family":"Yan","sequence":"first","affiliation":[{"name":"Los Alamos National Laboratory"}]},{"given":"Guanling","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell"}]},{"given":"Stephan","family":"Eidenbenz","sequence":"additional","affiliation":[{"name":"Los Alamos National Laboratory"}]},{"given":"Nan","family":"Li","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell"}]}],"member":"320","published-online":{"date-parts":[[2011,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Characterizing user behavior in online social networks","author":"Benevenuto F.","year":"2009","unstructured":"F. Benevenuto , T. Rodrigues , M. Cha , and V. Almeida . Characterizing user behavior in online social networks . Chicago, Illinois, USA , 2009 . F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. Chicago, Illinois, USA, 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948200"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.brightkite.com\/.  http:\/\/www.brightkite.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.caida.org.  http:\/\/www.caida.org."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/www.theregister.co.uk\/2010\/06\/01\/facebook_clickjacking_worm\/.  http:\/\/www.theregister.co.uk\/2010\/06\/01\/facebook_clickjacking_worm\/."},{"key":"e_1_3_2_1_8_1","unstructured":"http:\/\/www.cert.org\/advisories\/CA-2001-19.html.  http:\/\/www.cert.org\/advisories\/CA-2001-19.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.055103"},{"key":"e_1_3_2_1_10_1","unstructured":"http:\/\/www.facebook.com\/press\/info.php?statistics.  http:\/\/www.facebook.com\/press\/info.php?statistics."},{"key":"e_1_3_2_1_11_1","unstructured":"http:\/\/www.computerworld.com\/s\/article\/9128842\/Koobface_worm_to_users_Be_my_Facebook_friend.  http:\/\/www.computerworld.com\/s\/article\/9128842\/Koobface_worm_to_users_Be_my_Facebook_friend."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403023"},{"key":"e_1_3_2_1_13_1","unstructured":"http:\/\/www.gnip.org\/.  http:\/\/www.gnip.org\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.854498"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557064"},{"key":"e_1_3_2_1_16_1","unstructured":"http:\/\/igraph.sourceforge.net\/.  http:\/\/igraph.sourceforge.net\/."},{"key":"e_1_3_2_1_17_1","unstructured":"http:\/\/www.kaspersky.com\/news?id=207575670.  http:\/\/www.kaspersky.com\/news?id=207575670."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.98"},{"key":"e_1_3_2_1_19_1","unstructured":"http:\/\/www.pandasecurity.com\/NR\/rdonlyres\/BBB11FA2-10BD-435A-B936-5CD55C45E427\/0\/Malwaretargetssocialnetworks.pdf.  http:\/\/www.pandasecurity.com\/NR\/rdonlyres\/BBB11FA2-10BD-435A-B936-5CD55C45E427\/0\/Malwaretargetssocialnetworks.pdf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103626.1103629"},{"key":"e_1_3_2_1_21_1","unstructured":"http:\/\/www.bnonews.com\/news\/242.html.  http:\/\/www.bnonews.com\/news\/242.html."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.61.5678"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.035101"},{"key":"e_1_3_2_1_25_1","unstructured":"http:\/\/en-us.nielsen.com\/main\/news\/news_ releases\/2009\/september\/nielsen_reports_17.  http:\/\/en-us.nielsen.com\/main\/news\/news_ releases\/2009\/september\/nielsen_reports_17."},{"key":"e_1_3_2_1_26_1","unstructured":"http:\/\/www.statemaster.com\/encyclopedia\/Orkut.  http:\/\/www.statemaster.com\/encyclopedia\/Orkut."},{"key":"e_1_3_2_1_27_1","first-page":"65","article-title":"Immunization of complex networks","author":"Pastor-Satorras R.","year":"2002","unstructured":"R. Pastor-Satorras and A. Vespignani . Immunization of complex networks . Physical Review E , 65 , 2002 . R. Pastor-Satorras and A. Vespignani. Immunization of complex networks. Physical Review E, 65, 2002.","journal-title":"Physical Review E"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"e_1_3_2_1_29_1","unstructured":"http:\/\/www.cert.org\/advisories\/CA-2003-04.html.  http:\/\/www.cert.org\/advisories\/CA-2003-04.html."},{"key":"e_1_3_2_1_30_1","unstructured":"http:\/\/news.cnet.com\/8301-13577_3-10160850-36.html.  http:\/\/news.cnet.com\/8301-13577_3-10160850-36.html."},{"key":"e_1_3_2_1_31_1","volume-title":"March","author":"Nunes Telo","year":"2006","unstructured":"Telo and A. Nunes . Epidemics in small world networks. The European Physical Journal B - Condensed Matter and Complex Systems, 50(1):205--208 , March 2006 . Telo and A. Nunes. Epidemics in small world networks. The European Physical Journal B - Condensed Matter and Complex Systems, 50(1):205--208, March 2006."},{"key":"e_1_3_2_1_32_1","unstructured":"http:\/\/www.pcworld.com\/article\/162992\/twitter_worm_ attack_continues_heres_how_to_keep_safe.html.  http:\/\/www.pcworld.com\/article\/162992\/twitter_worm_ attack_continues_heres_how_to_keep_safe.html."},{"key":"e_1_3_2_1_33_1","volume-title":"Six Degrees: The Science of a Connected Age","author":"Watts D. J.","year":"2003","unstructured":"D. J. Watts . Six Degrees: The Science of a Connected Age . W. W. Norton &amp;amp; Company , 2003 . D. J. Watts. Six Degrees: The Science of a Connected Age. W. W. Norton &amp;amp; Company, 2003."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920264"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387709.1387715"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2004.1401687"}],"event":{"name":"ASIA CCS '11: 6th ACM Symposium on Information, Compuer and Communications Security","location":"Hong Kong China","acronym":"ASIA CCS '11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1966913.1966939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:25Z","timestamp":1750243945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966939"}},"subtitle":["nature, dynamics, and defense implications"],"short-title":[],"issued":{"date-parts":[[2011,3,22]]},"references-count":38,"alternative-id":["10.1145\/1966913.1966939","10.1145\/1966913"],"URL":"https:\/\/doi.org\/10.1145\/1966913.1966939","relation":{},"subject":[],"published":{"date-parts":[[2011,3,22]]},"assertion":[{"value":"2011-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}