{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:18:36Z","timestamp":1773886716146,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2076732.2076746","type":"proceedings-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T15:46:00Z","timestamp":1323791160000},"page":"93-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":291,"title":["The socialbot network"],"prefix":"10.1145","author":[{"given":"Yazan","family":"Boshmaf","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Ildar","family":"Muslukhov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"given":"Matei","family":"Ripeanu","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Facebook Open Graph Protocol. http:\/\/developers.facebook.com\/docs\/opengraph. Facebook Open Graph Protocol. http:\/\/developers.facebook.com\/docs\/opengraph."},{"key":"e_1_3_2_1_2_1","unstructured":"Sick profile maker. http:\/\/sickmarketing.com\/sick-profile-maker. Sick profile maker. http:\/\/sickmarketing.com\/sick-profile-maker."},{"key":"e_1_3_2_1_3_1","unstructured":"Facebook Statistics. http:\/\/www.facebook.com\/press March 2011. Facebook Statistics. http:\/\/www.facebook.com\/press March 2011."},{"key":"e_1_3_2_1_4_1","unstructured":"Jet bots. http:\/\/allbots.info 2011. Jet bots. http:\/\/allbots.info 2011."},{"key":"e_1_3_2_1_5_1","volume-title":"Trend Micro Research","author":"Baltazar J.","year":"2009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520402"},{"key":"e_1_3_2_1_8_1","volume-title":"Microsoft Research Tech Fest","author":"Boyd D.","year":"2009"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460628"},{"key":"e_1_3_2_1_10_1","unstructured":"Z. Coburn and G. Marra. Realboy: Believable twitter bots. http:\/\/ca.olin.edu\/2008\/realboy April 2011. Z. Coburn and G. Marra. Realboy: Believable twitter bots. http:\/\/ca.olin.edu\/2008\/realboy April 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774483"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"N. FitzGerald. New Facebook worm - don't click da' button baby! http:\/\/fitzgerald.blog.avg.com\/2009\/11\/ November 2009. N. FitzGerald. New Facebook worm - don't click da' button baby! http:\/\/fitzgerald.blog.avg.com\/2009\/11\/ November 2009.","DOI":"10.1063\/pt.4.0792"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833840"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_17_1","volume-title":"The 9th Workshop on the Economics of Information Security (WEIS 2010)","author":"Herley C.","year":"2010"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"C. Hernandez-Castro and A. Ribagorda . Remotely telling humans and computers apart: An unsolved problem. In J. Camenisch and D. Kesdogan editors iNetSec 2009? Open Research Problems in Network Security volume 309 of IFIP Advances in Information and Communication Technology pages 9 -- 26 . Springer Boston 2009 . C. Hernandez-Castro and A. Ribagorda. Remotely telling humans and computers apart: An unsolved problem. In J. Camenisch and D. Kesdogan editors iNetSec 2009? Open Research Problems in Network Security volume 309 of IFIP Advances in Information and Communication Technology pages 9--26. Springer Boston 2009.","DOI":"10.1007\/978-3-642-05437-2_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15257-3_8"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.09.003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367620"},{"key":"e_1_3_2_1_23_1","unstructured":"G. Livingston. Social media: The new battleground for politics. http:\/\/mashable.com\/2010\/09\/23\/congress-battle-social-media\/ September 2010. G. Livingston. Social media: The new battleground for politics. http:\/\/mashable.com\/2010\/09\/23\/congress-battle-social-media\/ September 2010."},{"key":"e_1_3_2_1_24_1","unstructured":"D. Misener. Rise of the socialbots: They could be influencing you online. http:\/\/www.cbc.ca\/news\/technology\/story\/2011\/03\/29\/f-vp-misener-socialbot-armies-election.html March 2011. D. Misener. Rise of the socialbots: They could be influencing you online. http:\/\/www.cbc.ca\/news\/technology\/story\/2011\/03\/29\/f-vp-misener-socialbot-armies-election.html March 2011."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_3_2_1_26_1","unstructured":"E. Morozov. Swine flu: Twitter's power to misinform. http:\/\/neteffect.foreignpolicy.com\/posts\/2009\/04\/25\/swine_flu_twitters_power_to_misinform April 2009. E. Morozov. Swine flu: Twitter's power to misinform. http:\/\/neteffect.foreignpolicy.com\/posts\/2009\/04\/25\/swine_flu_twitters_power_to_misinform April 2009."},{"key":"e_1_3_2_1_27_1","first-page":"28","volume-title":"Proceedings of the 19th USENIX Conference on Security, USENIX Security'10","author":"Motoyama M.","year":"2010"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2042445.2042473"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.61"},{"key":"e_1_3_2_1_30_1","unstructured":"S. Patil. Social network attacks surge. http:\/\/www.symantec.com\/connect\/blogs\/social-network-attacks-surge June 2011. S. Patil. Social network attacks surge. http:\/\/www.symantec.com\/connect\/blogs\/social-network-attacks-surge June 2011."},{"key":"e_1_3_2_1_31_1","volume-title":"NDSS","author":"Pitsillidis A.","year":"2010"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02476440"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"e_1_3_2_1_34_1","volume-title":"Inc.","author":"Robert C. P.","year":"2005"},{"key":"e_1_3_2_1_35_1","unstructured":"F. Salem and R. Mourtada. Civil movements: The impact of Facebook and Twitter. The Arab Social Media Report 1(2) 2011. F. Salem and R. Mourtada. Civil movements: The impact of Facebook and Twitter. The Arab Social Media Report 1(2) 2011."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_38_1","unstructured":"C. Taylor. Why not call it a Facebook revolution? http:\/\/edition.cnn.com\/2011\/TECH\/social.media\/02\/24\/facebook.revolution\/ February 2011. C. Taylor. Why not call it a Facebook revolution? http:\/\/edition.cnn.com\/2011\/TECH\/social.media\/02\/24\/facebook.revolution\/ February 2011."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.00409.x"},{"key":"e_1_3_2_1_40_1","unstructured":"J. A. Vargas. Obama raised half a billion online. http:\/\/voices.washingtonpost.com\/44\/2008\/11\/obama-raised-half-a-billion-on.html November 2008. J. A. Vargas. Obama raised half a billion online. http:\/\/voices.washingtonpost.com\/44\/2008\/11\/obama-raised-half-a-billion-on.html November 2008."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"L. von Ahn M. Blum N. J. Hopper and J. Langford . Captcha: Using hard AI problems for security. In E. Biham editor EUROCRYPT volume 2656 of Lecture Notes in Computer Science pages 294 -- 311 . Springer 2003 . L. von Ahn M. Blum N. J. Hopper and J. Langford. Captcha: Using hard AI problems for security. In E. Biham editor EUROCRYPT volume 2656 of Lecture Notes in Computer Science pages 294--311. Springer 2003.","DOI":"10.1007\/3-540-39200-9_18"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-007-9021-x"},{"key":"e_1_3_2_1_44_1","unstructured":"H. Yeend. Breaking CAPTCHA without OCR. http:\/\/www.puremango.co.uk\/2005\/11\/breaking_captcha_115\/ November 2005. H. Yeend. Breaking CAPTCHA without OCR. http:\/\/www.puremango.co.uk\/2005\/11\/breaking_captcha_115\/ November 2005."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"}],"event":{"name":"ACSAC '11: Annual Computer Security Applications Conference","location":"Orlando Florida USA","acronym":"ACSAC '11","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 27th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076746","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2076732.2076746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:45Z","timestamp":1750240485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2076732.2076746"}},"subtitle":["when bots socialize for fame and money"],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":45,"alternative-id":["10.1145\/2076732.2076746","10.1145\/2076732"],"URL":"https:\/\/doi.org\/10.1145\/2076732.2076746","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}