{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:55:37Z","timestamp":1771700137981,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,23]],"date-time":"2013-10-23T00:00:00Z","timestamp":1382486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,23]]},"DOI":"10.1145\/2504730.2504731","type":"proceedings-article","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T13:42:56Z","timestamp":1382449376000},"page":"163-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":108,"title":["Follow the green"],"prefix":"10.1145","author":[{"given":"Gianluca","family":"Stringhini","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Manuel","family":"Egele","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,10,23]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Klout blog. http:\/\/corp.klout.com\/blog\/2011\/11\/do-you-have-google-klout\/?goback=%2Egmp_4159546%2Egde_4159546_member_212786154.  Klout blog. http:\/\/corp.klout.com\/blog\/2011\/11\/do-you-have-google-klout\/?goback=%2Egmp_4159546%2Egde_4159546_member_212786154."},{"key":"e_1_3_2_2_2_1","unstructured":"Oauth community site. http:\/\/oauth.net.  Oauth community site. http:\/\/oauth.net."},{"key":"e_1_3_2_2_3_1","unstructured":"Twitter terms of service. http:\/\/support.twitter.com\/articles\/18311-the-twitter-rules.  Twitter terms of service. http:\/\/support.twitter.com\/articles\/18311-the-twitter-rules."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Justin Bieber Twitter followers 50% fake says report 2013.  Justin Bieber Twitter followers 50% fake says report 2013.","DOI":"10.5860\/CHOICE.50-5424"},{"key":"e_1_3_2_2_5_1","volume-title":"Detecting Spammers on Twitter. In Conference on Email and Anti-Spam (CEAS)","author":"Benvenuto F.","year":"2010","unstructured":"Benvenuto , F. , Magno , G. , Rodrigues , T. , and Almeida , V . Detecting Spammers on Twitter. In Conference on Email and Anti-Spam (CEAS) ( 2010 ). Benvenuto, F., Magno, G., Rodrigues, T., and Almeida, V. Detecting Spammers on Twitter. In Conference on Email and Anti-Spam (CEAS) (2010)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_2_7_1","volume-title":"Symposium on Network and Distributed System Security (NDSS)","author":"Cai Z.","year":"2012","unstructured":"Cai , Z. , and Jermaine , C . The latent community model for detecting sybils in social networks . In Symposium on Network and Distributed System Security (NDSS) ( 2012 ). Cai, Z., and Jermaine, C. The latent community model for detecting sybils in social networks. In Symposium on Network and Distributed System Security (NDSS) (2012)."},{"key":"e_1_3_2_2_8_1","volume-title":"Measuring User Influence in Twitter: The Million Follower Fallacy. In International AAAI Conference on Weblogs and Social Media","author":"Cha M.","year":"2010","unstructured":"Cha , M. , Haddadi , H. , Benvenuto , F. , and Gummadi , K . Measuring User Influence in Twitter: The Million Follower Fallacy. In International AAAI Conference on Weblogs and Social Media ( 2010 ). Cha, M., Haddadi, H., Benvenuto, F., and Gummadi, K. Measuring User Influence in Twitter: The Million Follower Fallacy. In International AAAI Conference on Weblogs and Social Media (2010)."},{"key":"e_1_3_2_2_9_1","volume-title":"Romney twitter account gets upsurge in fake followers, but from where? NBC News","author":"Coldewey D.","year":"2012","unstructured":"Coldewey , D. Romney twitter account gets upsurge in fake followers, but from where? NBC News ( 2012 ). Coldewey, D. Romney twitter account gets upsurge in fake followers, but from where? NBC News (2012)."},{"key":"e_1_3_2_2_10_1","volume-title":"Buying their way to twitter fame. The New York Times","author":"Considine A.","year":"2012","unstructured":"Considine , A. Buying their way to twitter fame. The New York Times ( 2012 ). Considine, A. Buying their way to twitter fame. The New York Times (2012)."},{"key":"e_1_3_2_2_11_1","volume-title":"COMPA: Detecting Compromised Accounts on Social Networks. In Symposium on Network and Distributed System Security (NDSS)","author":"Egele M.","year":"2013","unstructured":"Egele , M. , Stringhini , G. , Kruegel , C. , and Vigna , G . COMPA: Detecting Compromised Accounts on Social Networks. In Symposium on Network and Distributed System Security (NDSS) ( 2013 ). Egele, M., Stringhini, G., Kruegel, C., and Vigna, G. COMPA: Detecting Compromised Accounts on Social Networks. In Symposium on Network and Distributed System Security (NDSS) (2013)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879147"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470771"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_2_18_1","volume-title":"BusinessWeek Online","author":"King R.","year":"2008","unstructured":"King , R. How companies use Twitter to bolster their brands . In BusinessWeek Online ( 2008 ). King, R. How companies use Twitter to bolster their brands. In BusinessWeek Online (2008)."},{"key":"e_1_3_2_2_19_1","unstructured":"http:\/\/klout.com.  http:\/\/klout.com."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397741"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979104"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_2_24_1","volume-title":"Classification and regression by randomforest. R news","author":"Liaw A.","year":"2002","unstructured":"Liaw , A. , and Wiener , M . Classification and regression by randomforest. R news ( 2002 ). Liaw, A., and Wiener, M. Classification and regression by randomforest. R news (2002)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"e_1_3_2_2_26_1","volume-title":"Fake twitter followers become multimillion-dollar business. The New York Times","author":"Perlroth N.","year":"2013","unstructured":"Perlroth , N. Fake twitter followers become multimillion-dollar business. The New York Times ( 2013 ). Perlroth, N. Fake twitter followers become multimillion-dollar business. The New York Times (2013)."},{"key":"e_1_3_2_2_27_1","volume-title":"Advances in Kernel Methods - Support Vector Learning","author":"Platt J. C.","year":"1998","unstructured":"Platt , J. C. Fast training of support vector machines using sequential minimal optimization . In Advances in Kernel Methods - Support Vector Learning ( 1998 ). Platt, J. C. Fast training of support vector machines using sequential minimal optimization. In Advances in Kernel Methods - Support Vector Learning (1998)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342551"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_2_31_1","volume-title":"Trafficking Fraudulent Accounts: The Role of the Undergorund Market in Twitter Spam and Abuse. In USENIX Security Symposium","author":"Thomas K.","year":"2013","unstructured":"Thomas , K. and McCoy , D. and Grier , C . and Kolcz, A. and Paxson, V . Trafficking Fraudulent Accounts: The Role of the Undergorund Market in Twitter Spam and Abuse. In USENIX Security Symposium ( 2013 ). Thomas, K. and McCoy, D. and Grier, C. and Kolcz, A. and Paxson, V. Trafficking Fraudulent Accounts: The Role of the Undergorund Market in Twitter Spam and Abuse. In USENIX Security Symposium (2013)."},{"key":"e_1_3_2_2_32_1","unstructured":"Twitter. The twitter rules. http:\/\/support.twitter.com\/entries\/18311-the-twitter-rules 2010.  Twitter. The twitter rules. http:\/\/support.twitter.com\/entries\/18311-the-twitter-rules 2010."},{"key":"e_1_3_2_2_33_1","volume-title":"USENIX Security Symposium","author":"Wang G.","year":"2013","unstructured":"Wang , G. , Konolige , T. , Wilson , C. , Wang , X. , Zheng , H. , and Zhao , B. Y . You are how you click: Clickstream analysis for sybil detection . In USENIX Security Symposium ( Washington, DC , 2013 ). Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H., and Zhao, B. Y. You are how you click: Clickstream analysis for sybil detection. In USENIX Security Symposium (Washington, DC, 2013)."},{"key":"e_1_3_2_2_34_1","volume-title":"Symposium on Network and Distributed System Security (NDSS)","author":"Wang G.","year":"2013","unstructured":"Wang , G. , Mohanlal , M. , Wilson , C. , Wang , X. , Metzger , M. , Zheng , H. , and Zhao , B. Y . Social turing tests: Crowdsourcing sybil detection . In Symposium on Network and Distributed System Security (NDSS) ( 2013 ). Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M., Zheng, H., and Zhao, B. Y. Social turing tests: Crowdsourcing sybil detection. In Symposium on Network and Distributed System Security (NDSS) (2013)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_17"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"}],"event":{"name":"IMC'13: Internet Measurement Conference","location":"Barcelona Spain","acronym":"IMC'13","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2013 conference on Internet measurement conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2504730.2504731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2504730.2504731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:42Z","timestamp":1750236522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2504730.2504731"}},"subtitle":["growth and dynamics in twitter follower markets"],"short-title":[],"issued":{"date-parts":[[2013,10,23]]},"references-count":37,"alternative-id":["10.1145\/2504730.2504731","10.1145\/2504730"],"URL":"https:\/\/doi.org\/10.1145\/2504730.2504731","relation":{},"subject":[],"published":{"date-parts":[[2013,10,23]]},"assertion":[{"value":"2013-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}