{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:01:47Z","timestamp":1777042907526,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0845858"],"award-info":[{"award-number":["CNS-0845858"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1017858"],"award-info":[{"award-number":["CNS-1017858"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660269","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"477-488","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":177,"title":["Uncovering Large Groups of Active Malicious Accounts in Online Social Networks"],"prefix":"10.1145","author":[{"given":"Qiang","family":"Cao","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Xiaowei","family":"Yang","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Jieqi","family":"Yu","sequence":"additional","affiliation":[{"name":"Facebook Inc., Menlo Park, CA, USA"}]},{"given":"Christopher","family":"Palow","sequence":"additional","affiliation":[{"name":"Facebook Inc., Menlo Park, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.facebook.com\/notes\/facebook\/better-security-through-software\/248766257130","author":"Software Better Security","year":"2010","unstructured":"Better Security through Software . http:\/\/www.facebook.com\/notes\/facebook\/better-security-through-software\/248766257130 , 2010 . Better Security through Software. http:\/\/www.facebook.com\/notes\/facebook\/better-security-through-software\/248766257130, 2010."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.facebook.com\/notes\/facebook\/staying-in-control-of-your-facebook-logins\/389991097130","author":"Your Facebook Logins Staying","year":"2010","unstructured":"Staying in Control of Your Facebook Logins . http:\/\/www.facebook.com\/notes\/facebook\/staying-in-control-of-your-facebook-logins\/389991097130 , 2010 . Staying in Control of Your Facebook Logins. http:\/\/www.facebook.com\/notes\/facebook\/staying-in-control-of-your-facebook-logins\/389991097130, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.facebook.com\/notes\/facebook\/working-together-to-keep-you-secure\/68886667130","author":"Keep You Secure Working Together","year":"2010","unstructured":"Working Together to Keep You Secure . http:\/\/www.facebook.com\/notes\/facebook\/working-together-to-keep-you-secure\/68886667130 , 2010 . Working Together to Keep You Secure. http:\/\/www.facebook.com\/notes\/facebook\/working-together-to-keep-you-secure\/68886667130, 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/aws.amazon.com\/ec2\/pricing\/","author":"Pricing Amazon","year":"2013","unstructured":"Amazon EC2 Pricing . http:\/\/aws.amazon.com\/ec2\/pricing\/ , 2013 . Amazon EC2 Pricing. http:\/\/aws.amazon.com\/ec2\/pricing\/, 2013."},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/giraph.apache.org\/","author":"Giraph Apache","year":"2013","unstructured":"Apache Giraph . http:\/\/giraph.apache.org\/ , 2013 . Apache Giraph. http:\/\/giraph.apache.org\/, 2013."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/hadoop.apache.org\/","author":"Hadoop Apache","year":"2013","unstructured":"Apache Hadoop . http:\/\/hadoop.apache.org\/ , 2013 . Apache Hadoop. http:\/\/hadoop.apache.org\/, 2013."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/www.facebook.com\/help\/cookies","author":"Similar Technologies Pixels","year":"2013","unstructured":"Cookies, Pixels & Similar Technologies . https:\/\/www.facebook.com\/help\/cookies , 2013 . Cookies, Pixels & Similar Technologies. https:\/\/www.facebook.com\/help\/cookies, 2013."},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/investor.fb.com\/releasedetail.cfm?ReleaseID=736911","author":"Fourth Quarter Facebook Reports","year":"2013","unstructured":"Facebook Reports Fourth Quarter and Full Year 2012 Results . http:\/\/investor.fb.com\/releasedetail.cfm?ReleaseID=736911 , 2013 . Facebook Reports Fourth Quarter and Full Year 2012 Results. http:\/\/investor.fb.com\/releasedetail.cfm?ReleaseID=736911, 2013."},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/gadgetwise.blogs.nytimes.com\/2011\/05\/19\/facebook-to-combat-child-porn-using-microsofts-technology","author":"Combat Child Pornography Facebook's New","year":"2013","unstructured":"Facebook's New Way to Combat Child Pornography . http:\/\/gadgetwise.blogs.nytimes.com\/2011\/05\/19\/facebook-to-combat-child-porn-using-microsofts-technology , 2013 . Facebook's New Way to Combat Child Pornography. http:\/\/gadgetwise.blogs.nytimes.com\/2011\/05\/19\/facebook-to-combat-child-porn-using-microsofts-technology, 2013."},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/www.zdnet.com\/malicious-chrome-extensions-on-the-rise-7000019913\/","author":"Malicious Chrome","year":"2013","unstructured":"Malicious Chrome extensions on the rise. http:\/\/www.zdnet.com\/malicious-chrome-extensions-on-the-rise-7000019913\/ , 2013 . Malicious Chrome extensions on the rise. http:\/\/www.zdnet.com\/malicious-chrome-extensions-on-the-rise-7000019913\/, 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/www.facebook.com\/notes\/facebook-engineering\/scaling-apache-giraph-to-a-trillion-edges\/10151617006153920","author":"Scaling Apache","year":"2013","unstructured":"Scaling Apache Giraph to a trillion edges. https:\/\/www.facebook.com\/notes\/facebook-engineering\/scaling-apache-giraph-to-a-trillion-edges\/10151617006153920 , 2013 . Scaling Apache Giraph to a trillion edges. https:\/\/www.facebook.com\/notes\/facebook-engineering\/scaling-apache-giraph-to-a-trillion-edges\/10151617006153920, 2013."},{"key":"e_1_3_2_1_12_1","volume-title":"http:\/\/www.google.com\/policies\/technologies\/types\/","author":"Google Types","year":"2013","unstructured":"Types of cookies used by Google . http:\/\/www.google.com\/policies\/technologies\/types\/ , 2013 . Types of cookies used by Google. http:\/\/www.google.com\/policies\/technologies\/types\/, 2013."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/developers.facebook.com\/docs\/reference\/ads-api\/api-rate-limiting","author":"Facebook Rate Limiting","year":"2014","unstructured":"Rate Limiting at Facebook . https:\/\/developers.facebook.com\/docs\/reference\/ads-api\/api-rate-limiting , 2014 . Rate Limiting at Facebook. https:\/\/developers.facebook.com\/docs\/reference\/ads-api\/api-rate-limiting, 2014."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/developers.google.com\/+\/domains\/faq","author":"Rate Limiting","year":"2014","unstructured":"Rate Limiting at Google+. https:\/\/developers.google.com\/+\/domains\/faq , 2014 . Rate Limiting at Google+. https:\/\/developers.google.com\/+\/domains\/faq, 2014."},{"key":"e_1_3_2_1_15_1","volume-title":"Combinatorics of finite sets","author":"Anderson I.","year":"1987","unstructured":"I. Anderson . Combinatorics of finite sets . Clarendon Press , 1987 . I. Anderson. Combinatorics of finite sets. Clarendon Press, 1987."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488400"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_18_1","volume-title":"Intersection Problems in Combinatorics","author":"Brunk F.","year":"2009","unstructured":"F. Brunk . Intersection Problems in Combinatorics . University of St Andrews thesis. University of St Andrews , 2009 . F. Brunk. Intersection Problems in Combinatorics. University of St Andrews thesis. University of St Andrews, 2009."},{"key":"e_1_3_2_1_19_1","volume-title":"NSDI","author":"Cao Q.","year":"2012","unstructured":"Q. Cao , M. Sirivianos , X. Yang , and T. Pregueiro . Aiding the Detection of Fake Accounts in Large Scale Social Online Services . In NSDI , 2012 . Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In NSDI, 2012."},{"key":"e_1_3_2_1_20_1","volume-title":"NDSS","author":"Egele M.","year":"2013","unstructured":"M. Egele , G. Stringhini , C. Kr\u00fcgel , and G. Vigna . COMPA: Detecting Compromised Accounts on Social Networks . In NDSS , 2013 . M. Egele, G. Stringhini, C. Kr\u00fcgel, and G. Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In NDSS, 2013."},{"key":"e_1_3_2_1_21_1","volume-title":"USENIX SECURITY","author":"Gu G.","year":"2008","unstructured":"G. Gu , R. Perdisci , J. Zhang , and W. Lee . BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection . In USENIX SECURITY , 2008 . G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In USENIX SECURITY, 2008."},{"key":"e_1_3_2_1_22_1","volume-title":"NDSS","author":"Gu G.","year":"2008","unstructured":"G. Gu , J. Zhang , and W. Lee . BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic . In NDSS , 2008 . G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In NDSS , 2008."},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX SECURITY","author":"Hao S.","year":"2009","unstructured":"S. Hao , N. A. Syed , N. Feamster , A. G. Gray , and S. Krasser . Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automatic Reputation Engine . In USENIX SECURITY , 2009 . S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-Temporal Network-Level Automatic Reputation Engine. In USENIX SECURITY, 2009."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"P. Jaccard. The Distribution of the Flora in the Alpine Zone. New Phytologist 11(2) 1912.  P. Jaccard. The Distribution of the Flora in the Alpine Zone. New Phytologist 11(2) 1912.","DOI":"10.1111\/j.1469-8137.1912.tb05611.x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0305-0"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/509058.509086"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1497577.1497578"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807184"},{"key":"e_1_3_2_1_31_1","volume-title":"Two-mode clustering methods: a structured overview. Statistical Methods in Medical Research, 13: 363--394","author":"Mechelen I. V.","year":"2004","unstructured":"I. V. Mechelen , H. H. Bock , and P. D. Boeck . Two-mode clustering methods: a structured overview. Statistical Methods in Medical Research, 13: 363--394 , 2004 . I. V. Mechelen, H. H. Bock, and P. D. Boeck. Two-mode clustering methods: a structured overview. Statistical Methods in Medical Research, 13:363--394, 2004."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX SECURITY","author":"Motoyama M.","year":"2011","unstructured":"M. Motoyama , D. McCoy , K. Levchenko , S. Savage , and G. M. Voelker . Dirty Jobs: the Role of Freelance Labor in Web Service Abuse . In USENIX SECURITY , 2011 . M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. Dirty Jobs: the Role of Freelance Labor in Web Service Abuse. In USENIX SECURITY, 2011."},{"key":"e_1_3_2_1_34_1","volume-title":"NSDI","author":"Nishtala R.","year":"2013","unstructured":"R. Nishtala , H. Fugal , S. Grimm , M. Kwiatkowski , H. Lee , H. C. Li , R. McElroy , M. Paleczny , D. Peek , P. Saab , D. Stafford , T. Tung , and V. Venkataramani . Scaling Memcache at Facebook . In NSDI , 2013 . R. Nishtala, H. Fugal, S. Grimm, M. Kwiatkowski, H. Lee, H. C. Li, R. McElroy, M. Paleczny, D. Peek, P. Saab, D. Stafford, T. Tung, and V. Venkataramani. Scaling Memcache at Facebook. In NSDI, 2013."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX SECURITY","author":"Thomas K.","year":"2013","unstructured":"K. Thomas , D. McCoy , C. Grier , A. Kolcz , and V. Paxson . Trafficking Fraudulent Accounts: The Role of the Underground Market in T witter Spam and Abuse . In USENIX SECURITY , 2013 . K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in T witter Spam and Abuse. In USENIX SECURITY, 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807278"},{"key":"e_1_3_2_1_39_1","volume-title":"NSDI","author":"Tran D. N.","year":"2009","unstructured":"D. N. Tran , B. Min , J. Li , and L. Subramanian . Sybil-Resilient Online Content Rating . In NSDI , 2009 . D. N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-Resilient Online Content Rating. In NSDI, 2009."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX SECURITY","author":"Wang G.","year":"2013","unstructured":"G. Wang , T. Konolige , C. Wilson , X. Wang , H. Zheng , and B. Y. Zhao . You are How You Click: Clickstream Analysis for Sybil Detection . In USENIX SECURITY , 2013 . G. Wang, T. Konolige, C. Wilson, X. Wang, H. Zheng, and B. Y. Zhao. You are How You Click: Clickstream Analysis for Sybil Detection. In USENIX SECURITY, 2013."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402979"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_1_47_1","volume-title":"NSDI","author":"Zhao Y.","year":"2009","unstructured":"Y. Zhao , Y. Xie , F. Yu , Q. Ke , Y. Yu , Y. Chen , and E. Gillum . BotGraph: Large Scale Spamming Botnet Detection . In NSDI , 2009 . Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. BotGraph: Large Scale Spamming Botnet Detection. In NSDI, 2009."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948197"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660269","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660269"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":47,"alternative-id":["10.1145\/2660267.2660269","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660269","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}