{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:57Z","timestamp":1750307097794,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381872","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"826-831","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The changing nature of Spam 2.0"],"prefix":"10.1145","author":[{"given":"Vidyasagar","family":"Potdar","sequence":"first","affiliation":[{"name":"Curtin University, Perth, Australia"}]},{"given":"Yan","family":"Like","sequence":"additional","affiliation":[{"name":"BTOL Technologies Inc., Chengdu, China"}]},{"given":"Nazanin","family":"Firoozeh","sequence":"additional","affiliation":[{"name":"University of Pierre and Marie Curie, Paris, France"}]},{"given":"Debajyoti","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Maharashtra Institute of Technology Pune, India"}]},{"given":"Farida","family":"Ridzuan","sequence":"additional","affiliation":[{"name":"Curtin University, Perth, Australia"}]},{"given":"Dhiren","family":"Tejani","sequence":"additional","affiliation":[{"name":"Curtin University, Perth, Australia"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Definition of Spam 2.0,\" in IEEE International Conference on Digital Ecosystems and Technologies (DEST","author":"Hayati P.","year":"2010","unstructured":"P. Hayati , V. Potdar , S. Sarenche , N. Firuzeh , E. A. Yeganeh , and A. Talevski , \" Definition of Spam 2.0,\" in IEEE International Conference on Digital Ecosystems and Technologies (DEST 2010 ), Dubai , UAE , 2010. P. Hayati, V. Potdar, S. Sarenche, N. Firuzeh, E. A. Yeganeh, and A. Talevski, \"Definition of Spam 2.0,\" in IEEE International Conference on Digital Ecosystems and Technologies (DEST 2010), Dubai, UAE, 2010."},{"key":"e_1_3_2_1_2_1","volume-title":"Wales","author":"Hayati P.","year":"2009","unstructured":"P. Hayati and V. Potdar , \" Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods \" in 7th IEEE International Conference on Industrial Informatics Cardiff , Wales , 2009 . P. Hayati and V. Potdar, \"Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods \" in 7th IEEE International Conference on Industrial Informatics Cardiff, Wales, 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11161-7_23"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01104-5"},{"key":"e_1_3_2_1_5_1","volume-title":"Turkey","author":"Hayati P.","year":"2009","unstructured":"P. Hayati and V. Potdar , \" Spammer and Hacker, Two Old Friends,\" in 3rd IEEE International Conference on Digital Ecosystems and Technologies (IEEE-DEST 2009) Istanbul , Turkey , 2009 . P. Hayati and V. Potdar, \"Spammer and Hacker, Two Old Friends,\" in 3rd IEEE International Conference on Digital Ecosystems and Technologies (IEEE-DEST 2009) Istanbul, Turkey, 2009."},{"volume-title":"2009 {Accessed online","year":"2011","key":"e_1_3_2_1_6_1","unstructured":"Ferris-Research, \"Industry Statistics,\" http:\/\/www.ferris.com\/?page_id=1078 , Ed., 2009 {Accessed online : 5 November 2011 }. Ferris-Research, \"Industry Statistics,\" http:\/\/www.ferris.com\/?page_id=1078, Ed., 2009 {Accessed online: 5 November 2011}."},{"key":"e_1_3_2_1_7_1","unstructured":"Sophos \"Security threat report 2009 {Accecced Online May 2011} \" in http:\/\/www.sophos.com\/sophos\/docs\/eng\/marketing_material\/sophos-security-threat-report-jan-2009-na.pdf 2009.  Sophos \"Security threat report 2009 {Accecced Online May 2011} \" in http:\/\/www.sophos.com\/sophos\/docs\/eng\/marketing_material\/sophos-security-threat-report-jan-2009-na.pdf 2009."},{"key":"e_1_3_2_1_8_1","volume-title":"Characterizing the Splogosphere,\" in Proceedings of the 3rd Annual Workshop on the Weblogging Ecosystem","author":"Kolari P.","year":"2006","unstructured":"P. Kolari , A. Java , and T. Finin , \" Characterizing the Splogosphere,\" in Proceedings of the 3rd Annual Workshop on the Weblogging Ecosystem , 2006 . P. Kolari, A. Java, and T. Finin, \"Characterizing the Splogosphere,\" in Proceedings of the 3rd Annual Workshop on the Weblogging Ecosystem, 2006."},{"key":"e_1_3_2_1_9_1","unstructured":"Live-Spam-Zeitgeist \"Some Stats Akismet \" {Accessed online by May 2011} http:\/\/akismet.com\/stats\/.  Live-Spam-Zeitgeist \"Some Stats Akismet \" {Accessed online by May 2011} http:\/\/akismet.com\/stats\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.163"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.92"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12165-4_28"},{"key":"e_1_3_2_1_13_1","article-title":"Web Spambot Characterising using Self Organising Maps","author":"Hayati P.","year":"2010","unstructured":"P. Hayati , V. Potdar , A. Talevski , and K. Chai , \" Web Spambot Characterising using Self Organising Maps ,\" International Journal of Computer Systems Science and Engineering) , 2010 . P. Hayati, V. Potdar, A. Talevski, and K. Chai, \"Web Spambot Characterising using Self Organising Maps,\" International Journal of Computer Systems Science and Engineering), 2010.","journal-title":"International Journal of Computer Systems Science and Engineering)"},{"key":"e_1_3_2_1_14_1","volume-title":"Anti-Abuse and Spam Conference (CEAS 2010","author":"Hayati P.","year":"2010","unstructured":"P. Hayati , V. Potdar , W. F. Smyth , and A. Talevski , \" Rule-Based Web Spambot Detection Using Action Strings,\" in The Seventh Annual Collaboration, Electronic messaging , Anti-Abuse and Spam Conference (CEAS 2010 ), Redmond, Washington , 2010 . P. Hayati, V. Potdar, W. F. Smyth, and A. Talevski, \"Rule-Based Web Spambot Detection Using Action Strings,\" in The Seventh Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010), Redmond, Washington, 2010."},{"key":"e_1_3_2_1_15_1","unstructured":"S. Sinha R. Dattagupta D. Mukhopadhyay; Identify Web-page Content meaning using Knowledge based System for Dual Meaning Words; International Journal of Engineering Research and Applications; Vol.2 N0.4; July-August 2012; pp.877--880; ISSN 2248--9622.  S. Sinha R. Dattagupta D. Mukhopadhyay; Identify Web-page Content meaning using Knowledge based System for Dual Meaning Words; International Journal of Engineering Research and Applications ; Vol.2 N0.4; July-August 2012; pp.877--880; ISSN 2248--9622."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJKWI.2011.045163"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"D. Mukhopadhyay S. Sinha; An Algorithm for Construction of High Efficient Web Page Tree; International Journal of Convergence Information Technology; Korea; Vol.5 No.5; July 2010; pp.44--57; ISSN 1975--9320.  D. Mukhopadhyay S. Sinha; An Algorithm for Construction of High Efficient Web Page Tree; International Journal of Convergence Information Technology ; Korea; Vol.5 No.5; July 2010; pp.44--57; ISSN 1975--9320.","DOI":"10.4156\/jcit.vol5.issue5.5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"R. Dutta I. Ghosh A. Kundu D. Mukhopadhyay; An Advanced Partitioning Approach of Web Page Clustering utilizing Content & Link Structure; International Journal of Convergence Information Technology; Korea; Vol.4 No.3; September 2009; pp.65--71; ISSN 1975--9320.  R. Dutta I. Ghosh A. Kundu D. Mukhopadhyay; An Advanced Partitioning Approach of Web Page Clustering utilizing Content & Link Structure; International Journal of Convergence Information Technology ; Korea; Vol.4 No.3; September 2009; pp.65--71; ISSN 1975--9320.","DOI":"10.4156\/jcit.vol4.issue3.9"}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":18,"alternative-id":["10.1145\/2381716.2381872","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381872","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}