{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:03Z","timestamp":1763468163737,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,25]],"date-time":"2013-08-25T00:00:00Z","timestamp":1377388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,25]]},"DOI":"10.1145\/2492517.2500244","type":"proceedings-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:40:06Z","timestamp":1389706806000},"page":"878-885","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Spatio-temporal mining of software adoption &amp; penetration"],"prefix":"10.1145","author":[{"given":"Evangelos E.","family":"Papalexakis","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Tudor","family":"Dumitra\u015f","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Duen Horng (Polo)","family":"Chau","sequence":"additional","affiliation":[{"name":"Georgia Tech"}]},{"given":"B. Aditya","family":"Prakash","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2013,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0031182000055360"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Caballero Juan","year":"2011","unstructured":"Juan Caballero , Chris Grier , Christian Kreibich , and Vern Paxson . Measuring pay-per-install : The commoditization of malware distribution . In USENIX Security Symposium. USENIX Association , 2011 . Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. Measuring pay-per-install: The commoditization of malware distribution. In USENIX Security Symposium. USENIX Association, 2011."},{"key":"e_1_3_2_1_6_1","unstructured":"Jean Camp Lorrie Cranor Nick Feamster Joan Feigenbaum Stephanie Forrest Dave Kotz Wenke Lee Patrick Lincoln Vern Paxson Mike Reiter Ron Rivest William Sanders Stefan Savage Sean Smith Eugene Spafford and Sal Stolfo. Data for cybersecurity research: Process and \"wish list\". http:\/\/www.gtisc.gatech.edu\/files_nsf10\/data-wishlist.pdf Jun 2009.  Jean Camp Lorrie Cranor Nick Feamster Joan Feigenbaum Stephanie Forrest Dave Kotz Wenke Lee Patrick Lincoln Vern Paxson Mike Reiter Ron Rivest William Sanders Stefan Savage Sean Smith Eugene Spafford and Sal Stolfo. Data for cybersecurity research: Process and \"wish list\". http:\/\/www.gtisc.gatech.edu\/files_nsf10\/data-wishlist.pdf Jun 2009."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0803685105"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/233008.233038"},{"key":"e_1_3_2_1_10_1","volume-title":"Modeling skewed distribution using multifractals and the80--20'law. Computer Science Department, page 547","author":"Faloutsos C.","year":"1996","unstructured":"C. Faloutsos , Y. Matias , and A. Silberschatz . Modeling skewed distribution using multifractals and the80--20'law. Computer Science Department, page 547 , 1996 . C. Faloutsos, Y. Matias, and A. Silberschatz. Modeling skewed distribution using multifractals and the80--20'law. Computer Science Department, page 547, 1996."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316229"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159961"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144500371907"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401948"},{"key":"e_1_3_2_1_15_1","volume-title":"Cascading behavior in large blog graphs. arXiv preprint arXiv:0704.2803","author":"Leskovec J.","year":"2007","unstructured":"J. Leskovec , M. McGlohon , C. Faloutsos , N. Glance , and M. Hurst . Cascading behavior in large blog graphs. arXiv preprint arXiv:0704.2803 , 2007 . J. Leskovec, M. McGlohon, C. Faloutsos, N. Glance, and M. Hurst. Cascading behavior in large blog graphs. arXiv preprint arXiv:0704.2803, 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1090\/qam\/10666"},{"key":"e_1_3_2_1_17_1","volume-title":"Personal communication","author":"Maggs Bruce","year":"2012","unstructured":"Bruce Maggs . Personal communication , 2012 . Bruce Maggs. Personal communication, 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"Form, chance, and dimension","author":"Mandelbrot Benoit","year":"1977","unstructured":"Benoit Mandelbrot . Fractals : Form, chance, and dimension , volume 1 . W. H. Freeman , 1977 . Benoit Mandelbrot. Fractals: Form, chance, and dimension, volume 1. W. H. Freeman, 1977."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339537"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"e_1_3_2_1_22_1","first-page":"46","article-title":"Power laws, pareto distributions and zipf's law","author":"Newman M. E. J.","year":"2005","unstructured":"M. E. J. Newman . Power laws, pareto distributions and zipf's law . Contemporary Physics , 46 , 2005 . M. E. J. Newman. Power laws, pareto distributions and zipf's law. Contemporary Physics, 46, 2005.","journal-title":"Contemporary Physics"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978683"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.761337"},{"key":"e_1_3_2_1_25_1","volume-title":"Power Laws","author":"Schroeder Manfred","year":"1991","unstructured":"Manfred Schroeder . Fractals , Chaos , Power Laws . W. H. Freeman , New York , 6 edition, 1991 . Manfred Schroeder. Fractals, Chaos, Power Laws. W. H. Freeman, New York, 6 edition, 1991."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029624"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720288"},{"key":"e_1_3_2_1_28_1","volume-title":"Symantec Internet security threat report","author":"Symantec Corporation","year":"2012","unstructured":"Symantec Corporation . Symantec Internet security threat report , volume 17 . http:\/\/www.symantec.com\/threatreport\/, April 2012 . Symantec Corporation. Symantec Internet security threat report, volume 17. http:\/\/www.symantec.com\/threatreport\/, April 2012."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(02)00108-6"},{"key":"e_1_3_2_1_30_1","volume-title":"ICDE","author":"Wang Mengzhi","year":"2002","unstructured":"Mengzhi Wang , Tara Madhyastha , Ngai Hang Chang , Spiros Papadimitriou , and Christos Faloutsos . Data mining meets performance evaluation: Fast algorithms for modeling bursty traffic . ICDE , February 2002 . Mengzhi Wang, Tara Madhyastha, Ngai Hang Chang, Spiros Papadimitriou, and Christos Faloutsos. Data mining meets performance evaluation: Fast algorithms for modeling bursty traffic. ICDE, February 2002."},{"issue":"3","key":"e_1_3_2_1_31_1","first-page":"34","article-title":"Reflections on Witty: Analyzing the attacker.; log","volume":"29","author":"Weaver Nicholas","year":"2004","unstructured":"Nicholas Weaver and Dan Ellis . Reflections on Witty: Analyzing the attacker.; log in: The USENIX Magazine , 29 ( 3 ): 34 -- 37 , June 2004 . Nicholas Weaver and Dan Ellis. Reflections on Witty: Analyzing the attacker.; login: The USENIX Magazine, 29(3): 34--37, June 2004.","journal-title":"The USENIX Magazine"},{"key":"e_1_3_2_1_32_1","volume-title":"Human Behavior and Principle of Least Effort: An Introduction to Human Ecology","author":"Zipf G. K.","year":"1949","unstructured":"G. K. Zipf . Human Behavior and Principle of Least Effort: An Introduction to Human Ecology . Addison Wesley , Cambridge, Massachusetts , 1949 . G. K. Zipf. Human Behavior and Principle of Least Effort: An Introduction to Human Ecology. Addison Wesley, Cambridge, Massachusetts, 1949."}],"event":{"name":"ASONAM '13: Advances in Social Networks Analysis and Mining 2013","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Niagara Ontario Canada","acronym":"ASONAM '13"},"container-title":["Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492517.2500244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2492517.2500244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:37Z","timestamp":1750231717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2492517.2500244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,25]]},"references-count":32,"alternative-id":["10.1145\/2492517.2500244","10.1145\/2492517"],"URL":"https:\/\/doi.org\/10.1145\/2492517.2500244","relation":{},"subject":[],"published":{"date-parts":[[2013,8,25]]},"assertion":[{"value":"2013-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}