{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:57Z","timestamp":1750307097544,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381855","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"724-731","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Spam 2.0"],"prefix":"10.1145","author":[{"given":"Vidyasagar","family":"Potdar","sequence":"first","affiliation":[{"name":"Curtin University, Perth, Western Australia"}]},{"given":"Farida","family":"Ridzuan","sequence":"additional","affiliation":[{"name":"Curtin University, Perth, Western Australia"}]},{"given":"Jaipal","family":"Singh","sequence":"additional","affiliation":[{"name":"Curtin University, Perth, Western Australia"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"O'Reilly T. 2005. What is Web 2.0. http:\/\/oreilly.com\/web2\/archive\/what-is-web-20.html  O'Reilly T. 2005. What is Web 2.0. http:\/\/oreilly.com\/web2\/archive\/what-is-web-20.html"},{"key":"e_1_3_2_1_2_1","unstructured":"Nielsenwire 2010. What Americans Do Online: Social Media And Games Dominate Activity. http:\/\/blog.nielsen.com\/nielsenwire\/online_mobile\/what-americans-do-online-social-media-and-games-dominate-activity  Nielsenwire 2010. What Americans Do Online: Social Media And Games Dominate Activity. http:\/\/blog.nielsen.com\/nielsenwire\/online_mobile\/what-americans-do-online-social-media-and-games-dominate-activity"},{"key":"e_1_3_2_1_3_1","unstructured":"Internet World Stats 2011. World Internet Usage Statistics News and World Population Stats. http:\/\/www.internetworldstats.com\/stats.htm  Internet World Stats 2011. World Internet Usage Statistics News and World Population Stats. http:\/\/www.internetworldstats.com\/stats.htm"},{"key":"e_1_3_2_1_4_1","volume-title":"Digital Ecosystem and Technologies (DEST)","author":"Hayati P.","year":"2010","unstructured":"Hayati , P. , Potdar , V. , Talevski , A. , Firoozeh , N. , Sarenche , S. , Yeganeh ., E. 2010. Definition of spam 2.0: New spamming boom . In Digital Ecosystem and Technologies (DEST) , Dubai, UAE , 2010 . IEEE Computer Society . Hayati, P., Potdar, V., Talevski, A., Firoozeh, N., Sarenche, S., Yeganeh., E. 2010. Definition of spam 2.0: New spamming boom. In Digital Ecosystem and Technologies (DEST), Dubai, UAE, 2010. IEEE Computer Society."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2009.5195918"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11161-7_23"},{"key":"e_1_3_2_1_7_1","unstructured":"Roundtable 2007. 75% of Google's Blogspot Blogs are Spam. http:\/\/www.seroundtable.com\/archives\/012778.html  Roundtable 2007. 75% of Google's Blogspot Blogs are Spam. http:\/\/www.seroundtable.com\/archives\/012778.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Akismet 2011. 25 Billion Pieces of Spam. http:\/\/blog.akismet.com\/  Akismet 2011. 25 Billion Pieces of Spam. http:\/\/blog.akismet.com\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Mollom 2011. Scorecard | Mollom. http:\/\/mollom.com\/scorecard  Mollom 2011. Scorecard | Mollom. http:\/\/mollom.com\/scorecard"},{"key":"e_1_3_2_1_10_1","unstructured":"SC Magazine 2009. Twitter Facebook and LiveJournal Attacked.http:\/\/www.scmagazine.com.au\/News\/152328 twitter-facebook-and-livejournal-attacked.aspx  SC Magazine 2009. Twitter Facebook and LiveJournal Attacked.http:\/\/www.scmagazine.com.au\/News\/152328 twitter-facebook-and-livejournal-attacked.aspx"},{"key":"e_1_3_2_1_11_1","unstructured":"SC Magazine 2008. Facebook user profiles hacked. http:\/\/www.scmagazine.com.au\/News\/107015 facebook-user-profiles-hacked-wall-feature-relaying-spam.aspx  SC Magazine 2008. Facebook user profiles hacked. http:\/\/www.scmagazine.com.au\/News\/107015 facebook-user-profiles-hacked-wall-feature-relaying-spam.aspx"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2010.5610640"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1497308.1497402"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.163"},{"key":"e_1_3_2_1_15_1","unstructured":"Scam Sniper 2011. Phishing Scam Alert: Comment Spam Leads to Facebook Phishing Scam. http:\/\/scamsniper.blogspot.com.au\/2011\/06\/phishing-scam-alert-commenting-spam.html  Scam Sniper 2011. Phishing Scam Alert: Comment Spam Leads to Facebook Phishing Scam. http:\/\/scamsniper.blogspot.com.au\/2011\/06\/phishing-scam-alert-commenting-spam.html"},{"key":"e_1_3_2_1_16_1","unstructured":"Naked Security Sophos 2012. The Pink Facebook rogue application and survey scam. http:\/\/nakedsecurity.sophos.com\/2012\/02\/27\/pink-facebook-survey-scam\/  Naked Security Sophos 2012. The Pink Facebook rogue application and survey scam. http:\/\/nakedsecurity.sophos.com\/2012\/02\/27\/pink-facebook-survey-scam\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Webroot 2010. Facebook spam Leads to Viagra Vendor Drive-by Download. http:\/\/blog.webroot.com\/2010\/05\/28\/facebook-spam-leads-to-viagra-vendor-drive-by-download\/  Webroot 2010. Facebook spam Leads to Viagra Vendor Drive-by Download. http:\/\/blog.webroot.com\/2010\/05\/28\/facebook-spam-leads-to-viagra-vendor-drive-by-download\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Naked Security Sophos 2010. Erin Andrews Peephole Video maker jailed as hackers take advantage. http:\/\/nakedsecurity.sophos.com\/2010\/03\/16\/erin-andrews-peephole-video-maker-jailed-hackers-advantage\/  Naked Security Sophos 2010. Erin Andrews Peephole Video maker jailed as hackers take advantage. http:\/\/nakedsecurity.sophos.com\/2010\/03\/16\/erin-andrews-peephole-video-maker-jailed-hackers-advantage\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Sean 2010. CPAlead Spam on YouTube. http:\/\/www.f-secure.com\/weblog\/archives\/00002019.html  Sean 2010. CPAlead Spam on YouTube. http:\/\/www.f-secure.com\/weblog\/archives\/00002019.html"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2009.5276764"},{"key":"e_1_3_2_1_21_1","volume-title":"Blog Spam: A Review. In Conference on Email and Anti-Spam","author":"Thomason A.","year":"2007","unstructured":"Thomason , A. 2007 . Blog Spam: A Review. In Conference on Email and Anti-Spam ( Mountain View, California , August 2-3, 2007).CEAS2007. Thomason, A. 2007. Blog Spam: A Review. In Conference on Email and Anti-Spam (Mountain View, California, August 2-3, 2007).CEAS2007."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935048"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531914.1531924"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774483"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451986"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963324"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_30_1","unstructured":"Weiss D. 2009. The Security Implications of URL Shortening Services. http:\/\/unweary.com\/2009\/04\/the-security-implications-of-url-shortening-services.html  Weiss D. 2009. The Security Implications of URL Shortening Services. http:\/\/unweary.com\/2009\/04\/the-security-implications-of-url-shortening-services.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.92"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12165-4_28"},{"key":"e_1_3_2_1_33_1","volume-title":"International Journal of Computer Systems Science and Engineering)","author":"Hayati P.","year":"2010","unstructured":"Hayati , P. , Potdar , V. , Talevski , A. , Chai , K. 2010 . Web Spambot Characterising using Self Organising Maps . In International Journal of Computer Systems Science and Engineering) , 2010. Hayati, P., Potdar, V., Talevski, A., Chai, K. 2010. Web Spambot Characterising using Self Organising Maps. In International Journal of Computer Systems Science and Engineering), 2010."},{"key":"e_1_3_2_1_34_1","volume-title":"Anti-Abuse and Spam Conference (CEAS 2010","author":"Hayati P.","year":"2010","unstructured":"Hayati , P. , Potdar , V. , Smyth , W. F. , Talevski , A. 2010 . Rule-Based Web Spambot Detection Using Action Strings. In The Seventh Annual Collaboration, Electronic messaging , Anti-Abuse and Spam Conference (CEAS 2010 ), Redmond, Washington , 2010. Hayati, P., Potdar, V., Smyth, W. F., Talevski, A. 2010. Rule-Based Web Spambot Detection Using Action Strings. In The Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010), Redmond, Washington, 2010."},{"key":"e_1_3_2_1_35_1","volume-title":"USA","author":"Shin","year":"2011","unstructured":"Shin , Youngsang, Minaxi Gupta , and Steven Myers. \"The Nuts and Bolts of a Forum Spam Automator.\" In the LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, Berkeley, CA , USA , 2011 . Shin, Youngsang, Minaxi Gupta, and Steven Myers. \"The Nuts and Bolts of a Forum Spam Automator.\" In the LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, Berkeley, CA, USA, 2011."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030401"},{"key":"e_1_3_2_1_37_1","unstructured":"Brian Krebs 2012. ZeuS Trojan author in spam kingpins. http:\/\/www.theage.com.au\/it-pro\/security-it\/zeus-trojan-author-in-with-spam-kingpins-20120222-1tmqp.html  Brian Krebs 2012. ZeuS Trojan author in spam kingpins. http:\/\/www.theage.com.au\/it-pro\/security-it\/zeus-trojan-author-in-with-spam-kingpins-20120222-1tmqp.html"},{"key":"e_1_3_2_1_38_1","unstructured":"Sukanta Sinha Rana Dattagupta Debajyoti Mukhopadhyay; Identify Web-page Content meaning using Knowledge based System for Dual Meaning Words; International Journal of Engineering Research and Applications; Vol.2 N0.4; July-August 2012; pp.877--880; ISSN 2248-9622.  Sukanta Sinha Rana Dattagupta Debajyoti Mukhopadhyay; Identify Web-page Content meaning using Knowledge based System for Dual Meaning Words; International Journal of Engineering Research and Applications ; Vol.2 N0.4; July-August 2012; pp.877--880; ISSN 2248-9622."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJKWI.2011.045163"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/776985.776989"}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381855","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381855"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":40,"alternative-id":["10.1145\/2381716.2381855","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381855","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}