{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:49:06Z","timestamp":1752551346510,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,24]],"date-time":"2014-03-24T00:00:00Z","timestamp":1395619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,24]]},"DOI":"10.1145\/2554850.2554894","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"587-593","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["\"Sorry, I was hacked\""],"prefix":"10.1145","author":[{"given":"Eva","family":"Zangerle","sequence":"first","affiliation":[{"name":"University of Innsbruck, Austria"}]},{"given":"G\u00fcnther","family":"Specht","sequence":"additional","affiliation":[{"name":"University of Innsbruck, Austria"}]}],"member":"320","published-online":{"date-parts":[[2014,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"#TagDef hashtag definition directory. http:\/\/tagdef.com.  #TagDef hashtag definition directory. http:\/\/tagdef.com."},{"key":"e_1_3_2_1_2_1","volume-title":"Anti-abuse and Spam Conference (CEAS)","volume":"6","author":"Benevenuto F.","year":"2010"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3115\/1225403.1225421"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.412"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/15228835.2012.744249"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"volume-title":"COMPA: Detecting Compromised Accounts on Social Networks. In ISOC Network and Distributed System Security Symposium (NDSS)","year":"2013","author":"Egele M.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.125"},{"volume-title":"National Taiwan University","year":"2003","author":"Hsu C.-W.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0026683"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184305.2184316"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"volume-title":"Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. In Intl. AAAI Conference on Weblogs and Social Media. AAAI Press","year":"2011","author":"Lee K.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.3"},{"key":"e_1_3_2_1_20_1","unstructured":"Mashable. Twitter now has more than 200 million monthly active users http:\/\/mashable.com\/2012\/12\/18\/twitter-200-million-active-users\/.  Mashable. Twitter now has more than 200 million monthly active users http:\/\/mashable.com\/2012\/12\/18\/twitter-200-million-active-users\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2035700.2035717"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_25_1","unstructured":"Twitter. Filter API Documentation. https:\/\/dev.twitter.com\/docs\/api\/1.1\/post\/statuses\/filter.  Twitter. Filter API Documentation. https:\/\/dev.twitter.com\/docs\/api\/1.1\/post\/statuses\/filter."},{"key":"e_1_3_2_1_26_1","unstructured":"Twitter Rules. https:\/\/support.twitter.com\/articles\/18311-the-twitter-rules#.  Twitter Rules. https:\/\/support.twitter.com\/articles\/18311-the-twitter-rules#."},{"key":"e_1_3_2_1_27_1","unstructured":"Twitter Support. Keeping your account secure. https:\/\/support.twitter.com\/articles\/76036-safety-keeping-your-account-secure#.  Twitter Support. Keeping your account secure. https:\/\/support.twitter.com\/articles\/76036-safety-keeping-your-account-secure#."},{"key":"e_1_3_2_1_28_1","unstructured":"Twitter Support. My account has been compromised. https:\/\/support.twitter.com\/articles\/31796-my-account-has-been-compromised#.  Twitter Support. My account has been compromised. https:\/\/support.twitter.com\/articles\/31796-my-account-has-been-compromised#."},{"volume-title":"When Social Bots Attack: Modeling Susceptibility of Users in Online Social Networks. In 2nd workshop on Making Sense of Microposts at WWW2012","year":"2012","author":"Wagner C.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"Washington Post. Twitter turns 7: Users send over 400 million tweets per day. http:\/\/articles.washingtonpost.com\/2013-03-21\/business\/37889387_1_tweets-jack-dorsey-twitter.  Washington Post. Twitter turns 7: Users send over 400 million tweets per day. http:\/\/articles.washingtonpost.com\/2013-03-21\/business\/37889387_1_tweets-jack-dorsey-twitter."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009982220290"}],"event":{"name":"SAC 2014: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Gyeongju Republic of Korea","acronym":"SAC 2014"},"container-title":["Proceedings of the 29th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2554850.2554894","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2554850.2554894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:16Z","timestamp":1750234696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2554850.2554894"}},"subtitle":["a classification of compromised twitter accounts"],"short-title":[],"issued":{"date-parts":[[2014,3,24]]},"references-count":32,"alternative-id":["10.1145\/2554850.2554894","10.1145\/2554850"],"URL":"https:\/\/doi.org\/10.1145\/2554850.2554894","relation":{},"subject":[],"published":{"date-parts":[[2014,3,24]]},"assertion":[{"value":"2014-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}