{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:57Z","timestamp":1750307097892,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381856","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"732-739","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["How much money do spammers make from your website?"],"prefix":"10.1145","author":[{"given":"Pedram","family":"Hayati","sequence":"first","affiliation":[{"name":"Stratsec, BAE Systems Perth, Australia"}]},{"given":"Nazanin","family":"Firoozeh","sequence":"additional","affiliation":[{"name":"University of Pierre and Marie Curie, Paris, France"}]},{"given":"Vidyasagar","family":"Potdar","sequence":"additional","affiliation":[{"name":"Systems Curtin University, Perth, Australia"}]},{"given":"Kevin","family":"Chai","sequence":"additional","affiliation":[{"name":"University of New South, Wales, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"About Akismet - The automattic spam killer. Available at: http:\/\/akismet.com\/about\/{Accessed","author":"Akismet","year":"2011","unstructured":"Akismet , 2011. About Akismet - The automattic spam killer. Available at: http:\/\/akismet.com\/about\/{Accessed March 23, 2011 }. Akismet, 2011. About Akismet - The automattic spam killer. Available at: http:\/\/akismet.com\/about\/{Accessed March 23, 2011}."},{"volume-title":"Detecting Spammers on Twitter. In CEAS2010","author":"Benevenuto F.","key":"e_1_3_2_1_2_1","unstructured":"Benevenuto , F. et al., 2010 . Detecting Spammers on Twitter. In CEAS2010 . Redmond, Washington. Benevenuto, F. et al., 2010. Detecting Spammers on Twitter. In CEAS2010. Redmond, Washington."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_4_1","volume-title":"et al","author":"Gansterer W.","year":"2005","unstructured":"Gansterer , W. et al ., 2005 . Phases 2 and 3 of Project \"Spamabwehr I\": SMTP Based Concepts and Cost-Profit Models , Available at: http:\/\/eprints.cs.univie.ac.at\/717\/. Gansterer, W. et al., 2005. Phases 2 and 3 of Project \"Spamabwehr I\": SMTP Based Concepts and Cost-Profit Models, Available at: http:\/\/eprints.cs.univie.ac.at\/717\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866396"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2009.5195918"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11161-7_23"},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE International Conference on Digital Ecosystems and Technologies (DEST","author":"Hayati P.","year":"2010","unstructured":"Hayati , P. et al., 2010. Definition of Spam 2.0: New Spamming Boom . In IEEE International Conference on Digital Ecosystems and Technologies (DEST 2010 ). Dubai, UAE: IEEE. Hayati, P. et al., 2010. Definition of Spam 2.0: New Spamming Boom. In IEEE International Conference on Digital Ecosystems and Technologies (DEST 2010). Dubai, UAE: IEEE."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12165-4_28"},{"key":"e_1_3_2_1_10_1","unstructured":"Hayati et al. 2010. Web Spambot Characterising using Self Organising Maps. International Journal of Computer Systems Science and Engineering.  Hayati et al. 2010. Web Spambot Characterising using Self Organising Maps. International Journal of Computer Systems Science and Engineering."},{"key":"e_1_3_2_1_11_1","volume-title":"Anti-Abuse and Spam Conference (CEAS","author":"Hayati","year":"2010","unstructured":"Hayati , et al. , 2010 . Rule-Based Web Spambot Detection Using Action Strings. In The Seventh Annual Collaboration, Electronic messaging , Anti-Abuse and Spam Conference (CEAS 2010). Redmond, Washington. Hayati, et al., 2010. Rule-Based Web Spambot Detection Using Action Strings. In The Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010). Redmond, Washington."},{"volume-title":"CEAS2010","author":"Irani D.","key":"e_1_3_2_1_12_1","unstructured":"Irani , D. et al., 2010. Study of TrendStuffing on Twitter through Text Classification . In CEAS2010 . Redmond, Washington. Irani, D. et al., 2010. Study of TrendStuffing on Twitter through Text Classification. In CEAS2010. Redmond, Washington."},{"key":"e_1_3_2_1_13_1","volume-title":"Understanding and Reversing the Profit Model of Spam. In Workshop on Economics of Information Security 2005 (WEIS","author":"Judge W. Y. P.","year":"2005","unstructured":"Judge , W. Y. P. & Alperovitch , D. , 2005 . Understanding and Reversing the Profit Model of Spam. In Workshop on Economics of Information Security 2005 (WEIS 2005). Boston, MA, USA. Judge, W. Y. P. & Alperovitch, D., 2005. Understanding and Reversing the Profit Model of Spam. In Workshop on Economics of Information Security 2005 (WEIS 2005). Boston, MA, USA."},{"volume-title":"Proceedings of the International Conference on Weblogs and Social Media (ICWSM).","author":"Kolari P.","key":"e_1_3_2_1_14_1","unstructured":"Kolari , P. et al., 2007. Towards Spam Detection at Ping Servers . In Proceedings of the International Conference on Weblogs and Social Media (ICWSM). Kolari, P. et al., 2007. Towards Spam Detection at Ping Servers. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM)."},{"key":"e_1_3_2_1_15_1","unstructured":"Live-Spam-Zeitgeist 2009. Some Stats Akismet. http:\/\/www.akismet.com  Live-Spam-Zeitgeist 2009. Some Stats Akismet. http:\/\/www.akismet.com"},{"key":"e_1_3_2_1_16_1","unstructured":"Nucleus Research 2003. Spam: the silent ROI killer Report.  Nucleus Research 2003. Spam: the silent ROI killer Report."},{"volume-title":"USENIX 2006 Annual Technical Conference Refereed Paper.","author":"Park K.","key":"e_1_3_2_1_17_1","unstructured":"Park , K. et al., 2006. Securing Web Service by Automatic Robot Detection . In USENIX 2006 Annual Technical Conference Refereed Paper. Park, K. et al., 2006. Securing Web Service by Automatic Robot Detection. In USENIX 2006 Annual Technical Conference Refereed Paper."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030400"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.163"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)","author":"Shin Y.","year":"2011","unstructured":"Shin , Y. , Gupta , M. & Myers , S. , 2011 . The Nuts and Bolts of a Forum Spam Automator . In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) . Boston, MA, U. S. A. Shin, Y., Gupta, M. & Myers, S., 2011. The Nuts and Bolts of a Forum Spam Automator. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). Boston, MA, U. S. A."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013228602957"},{"key":"e_1_3_2_1_22_1","volume-title":"Canning spam | The Economist. Available at: http:\/\/www.economist.com\/node\/9805795 {Accessed","author":"The Economist","year":"2011","unstructured":"The Economist , 2007. Tech.view : Canning spam | The Economist. Available at: http:\/\/www.economist.com\/node\/9805795 {Accessed August 3, 2011 }. The Economist, 2007. Tech.view: Canning spam | The Economist. Available at: http:\/\/www.economist.com\/node\/9805795 {Accessed August 3, 2011}."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88411-8_30"},{"key":"e_1_3_2_1_24_1","first-page":"646","volume-title":"et al","author":"von Ahn L.","year":"2003","unstructured":"von Ahn , L. et al ., 2003 . CAPTCHA : Using Hard AI Problems for Security. In Advances in Cryptology --- EUROCRYPT 2003. pp. 646 -- 646 . Available at: http:\/\/dx.doi.org\/10.1007\/3-540-39200-9_18. 10.1007\/3-540-39200-9_18 von Ahn, L. et al., 2003. CAPTCHA: Using Hard AI Problems for Security. In Advances in Cryptology --- EUROCRYPT 2003. pp. 646--646. Available at: http:\/\/dx.doi.org\/10.1007\/3-540-39200-9_18."},{"key":"e_1_3_2_1_25_1","series-title":"Lecture Notes in Computer Science","first-page":"335","volume-title":"Data and Applications Security and Privacy XXIV","author":"Wang A.","unstructured":"Wang , A. , 2010. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach . In Data and Applications Security and Privacy XXIV . Lecture Notes in Computer Science . Springer Berlin\/Heidelberg , pp. 335 -- 342 . Available at: http:\/\/dx.doi.org\/10.1007\/978-3-642-13739-6_25. 10.1007\/978-3-642-13739-6_25 Wang, A., 2010. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. In Data and Applications Security and Privacy XXIV. Lecture Notes in Computer Science. Springer Berlin\/Heidelberg, pp. 335--342. Available at: http:\/\/dx.doi.org\/10.1007\/978-3-642-13739-6_25."},{"key":"e_1_3_2_1_26_1","volume-title":"The Secret Cost of Spam - IT Management. Available at: http:\/\/www.itmanagement.com\/whitepaper\/the-secret-cost-of-spam\/{Accessed","author":"Windows NET","year":"2011","unstructured":"Windows & . NET Magazine , 2004. The Secret Cost of Spam - IT Management. Available at: http:\/\/www.itmanagement.com\/whitepaper\/the-secret-cost-of-spam\/{Accessed August 3, 2011 } Windows & .NET Magazine, 2004. The Secret Cost of Spam - IT Management. Available at: http:\/\/www.itmanagement.com\/whitepaper\/the-secret-cost-of-spam\/{Accessed August 3, 2011}"}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":26,"alternative-id":["10.1145\/2381716.2381856","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381856","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}