{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:23:12Z","timestamp":1774797792171,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,16]],"date-time":"2012-04-16T00:00:00Z","timestamp":1334534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,16]]},"DOI":"10.1145\/2187836.2187846","type":"proceedings-article","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T18:41:27Z","timestamp":1335292887000},"page":"61-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":222,"title":["Understanding and combating link farming in the twitter social network"],"prefix":"10.1145","author":[{"given":"Saptarshi","family":"Ghosh","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, India"}]},{"given":"Bimal","family":"Viswanath","sequence":"additional","affiliation":[{"name":"MPI-SWS, Kaiserslautern - Saarbruecken, Germany"}]},{"given":"Farshad","family":"Kooti","sequence":"additional","affiliation":[{"name":"MPI-SWS, Kaiserslautern - Saarbruecken, Germany"}]},{"given":"Naveen Kumar","family":"Sharma","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, India"}]},{"given":"Gautam","family":"Korlam","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, India"}]},{"given":"Fabricio","family":"Benevenuto","sequence":"additional","affiliation":[{"name":"Federal University of Ouro Preto, Ouro Preto, Brazil"}]},{"given":"Niloy","family":"Ganguly","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, Kharagpur, India"}]},{"given":"Krishna Phani","family":"Gummadi","sequence":"additional","affiliation":[{"name":"MPI-SWS, Kaiserslautern - Saarbruecken, India"}]}],"member":"320","published-online":{"date-parts":[[2012,4,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"bitly blog - Spam and Malware Protection. http:\/\/tinyurl.com\/nv2oer.  bitly blog - Spam and Malware Protection. http:\/\/tinyurl.com\/nv2oer."},{"key":"e_1_3_2_1_2_1","unstructured":"Klout | The Standard for Influence. http:\/\/klout.com\/home.  Klout | The Standard for Influence. http:\/\/klout.com\/home."},{"key":"e_1_3_2_1_3_1","unstructured":"There Are Now 155m Tweets Posted Per Day Triple the Number a Year Ago. http:\/\/rww.to\/gv4VqA April 2011.  There Are Now 155m Tweets Posted Per Day Triple the Number a Year Ago. http:\/\/rww.to\/gv4VqA April 2011."},{"key":"e_1_3_2_1_4_1","unstructured":"Twitter help center: The Twitter rules. http:\/\/tinyurl.com\/22obg56 2011.  Twitter help center: The Twitter rules. http:\/\/tinyurl.com\/22obg56 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326561.1326563"},{"key":"e_1_3_2_1_6_1","volume-title":"Anti-Abuse and Spam Conference (CEAS)","author":"Benevenuto F.","year":"2010","unstructured":"F. Benevenuto , G. Magno , T. Rodrigues , and V. Almeida . Detecting spammers on Twitter. In Annual Collaboration, Electronic Messaging , Anti-Abuse and Spam Conference (CEAS) , 2010 . F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on Twitter. In Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/290941.290972"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277814"},{"key":"e_1_3_2_1_9_1","volume-title":"AAAI Int'l Conference on Weblogs and Social Media (ICWSM)","author":"Cha M.","year":"2010","unstructured":"M. Cha , H. Haddadi , F. Benevenuto , and K. P. Gummadi . Measuring user influence in Twitter: the million follower fallacy . In AAAI Int'l Conference on Weblogs and Social Media (ICWSM) , 2010 . M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. Measuring user influence in Twitter: the million follower fallacy. In AAAI Int'l Conference on Weblogs and Social Media (ICWSM), 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372054"},{"key":"e_1_3_2_1_11_1","volume-title":"AAAI Workshop on Artificial Intelligence for Web Search","author":"Davison B. D.","year":"2000","unstructured":"B. D. Davison . Recognizing nepotistic links on the web . In AAAI Workshop on Artificial Intelligence for Web Search , 2000 . B. D. Davison. Recognizing nepotistic links on the web. In AAAI Workshop on Artificial Intelligence for Web Search, 2000."},{"key":"e_1_3_2_1_12_1","volume-title":"Spanish Conference on Information Retrieval (CERI)","author":"Gayo-Avello D.","year":"2010","unstructured":"D. Gayo-Avello and D. J. Brenes . Overcoming Spammers in Twitter - a tale of five algorithms . In Spanish Conference on Information Retrieval (CERI) , 2010 . D. Gayo-Avello and D. J. Brenes. Overcoming Spammers in Twitter - a tale of five algorithms. In Spanish Conference on Information Retrieval (CERI), 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_14_1","volume-title":"Int'l Conference on Very Large Data Bases (VLDB)","author":"Gy\u00f6ngyi Z.","year":"2005","unstructured":"Z. Gy\u00f6ngyi and H. Garcia-Molina . Link spam alliances . In Int'l Conference on Very Large Data Bases (VLDB) , 2005 . Z. Gy\u00f6ngyi and H. Garcia-Molina. Link spam alliances. In Int'l Conference on Very Large Data Bases (VLDB), 2005."},{"key":"e_1_3_2_1_15_1","volume-title":"Int'l Conference on Very Large Data Bases (VLDB)","author":"Gy\u00f6ngyi Z.","year":"2004","unstructured":"Z. Gy\u00f6ngyi , H. Garcia-Molina , and J. Pedersen . Combating web spam with trustrank . In Int'l Conference on Very Large Data Bases (VLDB) , 2004 . Z. Gy\u00f6ngyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with trustrank. In Int'l Conference on Very Large Data Bases (VLDB), 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511513"},{"key":"e_1_3_2_1_17_1","unstructured":"US confirms it asked Twitter to stay open to help Iran protesters. http:\/\/tinyurl.com\/klv36p.  US confirms it asked Twitter to stay open to help Iran protesters. http:\/\/tinyurl.com\/klv36p."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979104"},{"key":"e_1_3_2_1_19_1","unstructured":"K. Lee J. Caverlee and S. Webb. Uncovering social spammers: social honeypots  K. Lee J. Caverlee and S. Webb. Uncovering social spammers: social honeypots"},{"key":"e_1_3_2_1_20_1","volume-title":"ACM Int'l Conference on Research and Development in Information Retrieval (SIGIR)","year":"2010","unstructured":"machine learning. In ACM Int'l Conference on Research and Development in Information Retrieval (SIGIR) , 2010 . machine learning. In ACM Int'l Conference on Research and Development in Information Retrieval (SIGIR), 2010."},{"key":"e_1_3_2_1_21_1","volume-title":"AAAI Int'l Conference on Weblogs and Social Media (ICWSM)","author":"Lee K.","year":"2011","unstructured":"K. Lee , B. D. Eoff , and J. Caverlee . Seven months with the devils: a long-term study of content polluters on Twitter . In AAAI Int'l Conference on Weblogs and Social Media (ICWSM) , 2011 . K. Lee, B. D. Eoff, and J. Caverlee. Seven months with the devils: a long-term study of content polluters on Twitter. In AAAI Int'l Conference on Weblogs and Social Media (ICWSM), 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00034-7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159947"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_3_2_1_25_1","unstructured":"M. Sobek. Google PageRank - PR 0. http:\/\/pr.efactory.de\/e-pr0.shtml.  M. Sobek. Google PageRank - PR 0. http:\/\/pr.efactory.de\/e-pr0.shtml."},{"key":"e_1_3_2_1_26_1","unstructured":"D. Talbot. How Google Ranks Tweets. http:\/\/www.technologyreview.in\/web\/24353\/.  D. Talbot. How Google Ranks Tweets. http:\/\/www.technologyreview.in\/web\/24353\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935842"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_29_1","volume-title":"TechCrunch","author":"Rao L.","year":"2010","unstructured":"L. Rao , Twitter Seeing 90 Million Tweets Per Day, 25 Percent Contain Links , TechCrunch , 2010 . http:\/\/tinyurl.com\/27x5cay. L. Rao, Twitter Seeing 90 Million Tweets Per Day, 25 Percent Contain Links, TechCrunch, 2010. http:\/\/tinyurl.com\/27x5cay."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062762"},{"key":"e_1_3_2_1_32_1","volume-title":"Workshop on Models of Trust for the Web","author":"Wu B.","year":"2006","unstructured":"B. Wu , V. Goel , and B. D. Davison . Propagating trust and distrust to demote web spam . In Workshop on Models of Trust for the Web , 2006 . B. Wu, V. Goel, and B. D. Davison. Propagating trust and distrust to demote web spam. In Workshop on Models of Trust for the Web, 2006."},{"issue":"1","key":"e_1_3_2_1_33_1","first-page":"1","article-title":"Detecting spam in a twitter network","volume":"15","author":"Yardi S.","year":"2010","unstructured":"S. Yardi , D. Romero , G. Schoenebeck , and D. M. Boyd . Detecting spam in a twitter network . First Monday , 15 ( 1 ): 1 -- 13 , Jan 2010 . S. Yardi, D. Romero, G. Schoenebeck, and D. M. Boyd. Detecting spam in a twitter network. First Monday, 15(1):1--13, Jan 2010.","journal-title":"First Monday"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987510.1987521"}],"event":{"name":"WWW 2012: 21st World Wide Web Conference 2012","location":"Lyon France","acronym":"WWW 2012","sponsor":["Univ. de Lyon Universite de Lyon","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 21st international conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2187836.2187846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2187836.2187846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:33Z","timestamp":1750241193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2187836.2187846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,16]]},"references-count":34,"alternative-id":["10.1145\/2187836.2187846","10.1145\/2187836"],"URL":"https:\/\/doi.org\/10.1145\/2187836.2187846","relation":{},"subject":[],"published":{"date-parts":[[2012,4,16]]},"assertion":[{"value":"2012-04-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}