{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T05:42:42Z","timestamp":1773207762586,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1145\/2030376.2030387","type":"proceedings-article","created":{"date-parts":[[2011,9,13]],"date-time":"2011-09-13T12:43:28Z","timestamp":1315917808000},"page":"92-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["Phi.sh\/$oCiaL"],"prefix":"10.1145","author":[{"given":"Sidharth","family":"Chhabra","sequence":"first","affiliation":[{"name":"Delhi College of Engineering"}]},{"given":"Anupama","family":"Aggarwal","sequence":"additional","affiliation":[{"name":"IIIT-Delhi"}]},{"given":"Fabricio","family":"Benevenuto","sequence":"additional","affiliation":[{"name":"Federal University of Ouro Preto"}]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[{"name":"IIIT-Delhi"}]}],"member":"320","published-online":{"date-parts":[[2011,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963505"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 7th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS)","author":"Benevenuto F.","year":"2010","unstructured":"F. Benevenuto , G. Magno , T. Rodrigues , and V. Almeida . Detecting spammers on twitter . In Proceedings of the 7th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS) , 2010 . F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In Proceedings of the 7th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572047"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_3_2_1_5_1","volume-title":"4th International AAAI Conference on Weblogs and Social Media (ICWSM), Washington DC, USA","author":"Cha M.","year":"2010","unstructured":"M. Cha , H. Haddadi , F. Benevenuto , and K. P. Gummadi . Measuring user influence in twitter: The million follower fallacy . In 4th International AAAI Conference on Weblogs and Social Media (ICWSM), Washington DC, USA , May 2010 . M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. Measuring user influence in twitter: The million follower fallacy. In 4th International AAAI Conference on Weblogs and Social Media (ICWSM), Washington DC, USA, May 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242660"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_13_1","unstructured":"L. James. Phishing Exposed. Syngress Publishing Canada November 2005.   L. James. Phishing Exposed. Syngress Publishing Canada November 2005."},{"key":"e_1_3_2_1_14_1","first-page":"21","volume-title":"Power and Influence in Organizations","author":"Krackhardt D.","year":"2008","unstructured":"D. Krackhardt . Simmelian ties: super strong and sticky . In R. M. Kramer and M. A. Neale, editors, Power and Influence in Organizations , pages 21 -- 38 . Sage , Thousand Oaks, CA, USA , 2008 . D. Krackhardt. Simmelian ties: super strong and sticky. In R. M. Kramer and M. A. Neale, editors, Power and Influence in Organizations, pages 21--38. Sage, Thousand Oaks, CA, USA, 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754393.1754396"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_1_19_1","volume-title":"Int'l AAAI Conference on Weblogs and Social Media (ICWSM)","author":"Lee K.","year":"2011","unstructured":"K. Lee , B. Eoff , and J. Caverlee . Seven months with the devils: A long-term study of content polluters on twitter . In Int'l AAAI Conference on Weblogs and Social Media (ICWSM) , 2011 . K. Lee, B. Eoff, and J. Caverlee. Seven months with the devils: A long-term study of content polluters on twitter. In Int'l AAAI Conference on Weblogs and Social Media (ICWSM), 2011."},{"key":"e_1_3_2_1_20_1","volume-title":"August","author":"Miller R. C.","year":"2005","unstructured":"R. C. Miller and M. Wu . Fighting Phishing at the User Interface. O'Reilly , August 2005 . In Lorrie Cranor and Simson Garfinkel (Eds.) Security and Usability: Designing Secure Systems that People Can Use . R. C. Miller and M. Wu. Fighting Phishing at the User Interface. O'Reilly, August 2005. In Lorrie Cranor and Simson Garfinkel (Eds.) Security and Usability: Designing Secure Systems that People Can Use."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833585"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 6th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS)","author":"Sheng S.","year":"2010","unstructured":"S. Sheng , B. Wardman , G. Warner , L. F. Cranor , J. Hong , and C. Zhang . An empirical analysis of phishing blacklists . Proceedings of the 6th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS) , 2010 . S. Sheng, B. Wardman, G. Warner, L. F. Cranor, J. Hong, and C. Zhang. An empirical analysis of phishing blacklists. Proceedings of the 6th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"WOOT","author":"Shue C. A.","year":"2008","unstructured":"C. A. Shue , A. J. Kalafut , and M. Gupta . Exploitable redirects on the web: Identification, prevalence, and defense . In WOOT , 2008 . C. A. Shue, A. J. Kalafut, and M. Gupta. Exploitable redirects on the web: Identification, prevalence, and defense. In WOOT, 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_27_1","volume-title":"Int'l Conference on Security and Cryptography (SECRYPT)","author":"Wang A.","year":"2010","unstructured":"A. Wang . Don't follow me: Spam detection in twitter . In Int'l Conference on Security and Cryptography (SECRYPT) , 2010 . A. Wang. Don't follow me: Spam detection in twitter. In Int'l Conference on Security and Cryptography (SECRYPT), 2010."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184491"},{"key":"e_1_3_2_1_29_1","volume-title":"Detecting and Analyzing Automated Activity on Twitter. Passive and Active Measurement Conference","author":"Zhang C. M.","year":"2011","unstructured":"C. M. Zhang and V. Paxson . Detecting and Analyzing Automated Activity on Twitter. Passive and Active Measurement Conference , 2011 . C. M. Zhang and V. Paxson. Detecting and Analyzing Automated Activity on Twitter. Passive and Active Measurement Conference, 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242659"}],"event":{"name":"CEAS '11: The 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference","location":"Perth Australia","acronym":"CEAS '11"},"container-title":["Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030387","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2030376.2030387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:48Z","timestamp":1750240128000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2030376.2030387"}},"subtitle":["the phishing landscape through short URLs"],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":29,"alternative-id":["10.1145\/2030376.2030387","10.1145\/2030376"],"URL":"https:\/\/doi.org\/10.1145\/2030376.2030387","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]},"assertion":[{"value":"2011-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}