{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:14:34Z","timestamp":1774628074166,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T00:00:00Z","timestamp":1320192000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,11,2]]},"DOI":"10.1145\/2068816.2068840","type":"proceedings-article","created":{"date-parts":[[2011,11,16]],"date-time":"2011-11-16T10:40:21Z","timestamp":1321440021000},"page":"243-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":284,"title":["Suspended accounts in retrospect"],"prefix":"10.1145","author":[{"given":"Kurt","family":"Thomas","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, USA"}]},{"given":"Chris","family":"Grier","sequence":"additional","affiliation":[{"name":"University of California, Berkeley; International Computer Science Institute, Berkeley, USA"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, USA"}]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[{"name":"University of California, Berkeley; International Computer Science Institute, Berkeley, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security","author":"Anderson D.","year":"2007"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the Conference on Email and Anti-Spam (CEAS)","author":"Benevenuto F.","year":"2010"},{"key":"e_1_3_2_1_3_1","unstructured":"bit.ly. Spam and Malware Protection. 2009. http:\/\/blog.bit.ly\/post\/138381844\/spam-and-malware-protection.  bit.ly. Spam and Malware Protection. 2009. http:\/\/blog.bit.ly\/post\/138381844\/spam-and-malware-protection."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Danezis G.","year":"2009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS)","author":"Holz T.","year":"2008"},{"key":"e_1_3_2_1_8_1","unstructured":"HootSuite. Kapow! HootSuite Fights the Evils of Phishing Malware and Spam. 2010. http:\/\/blog.hootsuite.com\/hootsuite-fights-malware-phishing\/.  HootSuite. Kapow! HootSuite Fights the Evils of Phishing Malware and Spam. 2010. http:\/\/blog.hootsuite.com\/hootsuite-fights-malware-phishing\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_10_1","unstructured":"B. Krebs. Battling the zombie web site armies. https:\/\/krebsonsecurity.com\/2011\/01\/battling-the-zombie-web-site-armies\/#more-7522 2011.  B. Krebs. Battling the zombie web site armies. https:\/\/krebsonsecurity.com\/2011\/01\/battling-the-zombie-web-site-armies\/#more-7522 2011."},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)","author":"Kreibich C.","year":"2009"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 20th USENIX Security Symposium","author":"Motoyama M.","year":"2011"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315288"},{"key":"e_1_3_2_1_16_1","volume-title":"3rd International Conference on Malicious and Unwanted Software","author":"Sinha S.","year":"2008"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_16"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Workshop on Economics of Information Security (WEIS)","author":"Stone-Gross B.","year":"2011"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_21_1","unstructured":"Twitter. The Twitter Rules. http:\/\/support.twitter.com\/entries\/18311-the-twitter-rules 2010.  Twitter. The Twitter Rules. http:\/\/support.twitter.com\/entries\/18311-the-twitter-rules 2010."},{"key":"e_1_3_2_1_22_1","unstructured":"Twitter. Twitter API wiki. http:\/\/dev.twitter.com\/doc 2010.  Twitter. Twitter API wiki. http:\/\/dev.twitter.com\/doc 2010."},{"key":"e_1_3_2_1_23_1","unstructured":"Twitter. Numbers. http:\/\/blog.twitter.com\/2011\/03\/numbers.html March 2011.  Twitter. Numbers. http:\/\/blog.twitter.com\/2011\/03\/numbers.html March 2011."},{"key":"e_1_3_2_1_24_1","unstructured":"Twitter. OAuth FAQ. https:\/\/dev.twitter.com\/docs\/auth\/oauth\/faq 2011.  Twitter. OAuth FAQ. https:\/\/dev.twitter.com\/docs\/auth\/oauth\/faq 2011."},{"key":"e_1_3_2_1_25_1","unstructured":"Twitter. Terms of service May 2011. http:\/\/twitter.com\/tos.  Twitter. Terms of service May 2011. http:\/\/twitter.com\/tos."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"}],"event":{"name":"IMC '11: Internet Measurement Conference","location":"Berlin Germany","acronym":"IMC '11","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2068816.2068840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2068816.2068840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:24Z","timestamp":1750240464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2068816.2068840"}},"subtitle":["an analysis of twitter spam"],"short-title":[],"issued":{"date-parts":[[2011,11,2]]},"references-count":26,"alternative-id":["10.1145\/2068816.2068840","10.1145\/2068816"],"URL":"https:\/\/doi.org\/10.1145\/2068816.2068840","relation":{},"subject":[],"published":{"date-parts":[[2011,11,2]]},"assertion":[{"value":"2011-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}