{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:54:30Z","timestamp":1756994070650,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T00:00:00Z","timestamp":1444953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000187","name":"Faculty of Graduate Studies, University of British Columbia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000187","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,16]]},"DOI":"10.1145\/2808769.2808772","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"81-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Thwarting Fake OSN Accounts by Predicting their Victims"],"prefix":"10.1145","author":[{"given":"Yazan","family":"Boshmaf","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Matei","family":"Ripeanu","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Elizeu","family":"Santos-Neto","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.33"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.71"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 5th USENIX Workshop on Large-scale Exploits and Emergent Threats","volume":"12","author":"Boshmaf Y.","year":"2012","unstructured":"Y. Boshmaf , I. Muslukhov , K. Beznosov , and M. Ripeanu . Key challenges in defending against malicious socialbots . In Proceedings of the 5th USENIX Workshop on Large-scale Exploits and Emergent Threats , volume 12 , 2012 . Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. Key challenges in defending against malicious socialbots. In Proceedings of the 5th USENIX Workshop on Large-scale Exploits and Emergent Threats, volume 12, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492568"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.006"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_13_1","first-page":"15","volume-title":"USENIX conference on Networked Systems Design and Implementation","author":"Cao Q.","year":"2012","unstructured":"Q. Cao , M. Sirivianos , X. Yang , and T. Pregueiro . Aiding the detection of fake accounts in large scale social online services . In USENIX conference on Networked Systems Design and Implementation , pages 15 -- 15 . USENIX Association , 2012 . Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In USENIX conference on Networked Systems Design and Implementation, pages 15--15. USENIX Association, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_15_1","unstructured":"CBC. Facebook shares drop on news of fake accounts Aug 2012. URL http:\/\/goo.gl\/6s5FKL.  CBC. Facebook shares drop on news of fake accounts Aug 2012. URL http:\/\/goo.gl\/6s5FKL."},{"key":"e_1_3_2_1_16_1","volume-title":"Security and usability: designing secure systems that people can use","author":"Cranor L. F.","year":"2005","unstructured":"L. F. Cranor . Security and usability: designing secure systems that people can use . O'Reilly Media, Inc. , 2005 . L. F. Cranor. Security and usability: designing secure systems that people can use. O'Reilly Media, Inc., 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500225"},{"volume-title":"May","year":"2015","key":"e_1_3_2_1_19_1","unstructured":"Facebook. Quarterly earning reports , May 2015 . URL http:\/\/goo.gl\/YujtO. Facebook. Quarterly earning reports, May 2015. URL http:\/\/goo.gl\/YujtO."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837124"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The elements of statistical learning: Data mining, inference, and prediction","author":"Hastie T.","year":"2009","unstructured":"T. Hastie , R. Tibshirani , and J. Friedman . The elements of statistical learning: Data mining, inference, and prediction , second edition. Springer , 2009 . T. Hastie, R. Tibshirani, and J. Friedman. The elements of statistical learning: Data mining, inference, and prediction, second edition. Springer, 2009."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090150.2090161"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-3-642-22424-9_4","volume-title":"Detection of intrusions and malware, and vulnerability assessment","author":"Irani D.","year":"2011","unstructured":"D. Irani , M. Balduzzi , D. Balzarotti , E. Kirda , and C. Pu . Reverse social engineering attacks in online social networks . In Detection of intrusions and malware, and vulnerability assessment , pages 55 -- 74 . Springer , 2011 . D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. In Detection of intrusions and malware, and vulnerability assessment, pages 55--74. Springer, 2011."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1997.1404"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129177"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081950"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600178"},{"key":"e_1_3_2_1_32_1","first-page":"15","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation","author":"Mislove A.","year":"2008","unstructured":"A. Mislove , A. Post , P. Druschel , and P. K. Gummadi . Ostra: Leveraging trust to thwart unwanted communication . In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation , pages 15 -- 30 . USENIX Association , 2008 . A. Mislove, A. Post, P. Druschel, and P. K. Gummadi. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pages 15--30. USENIX Association, 2008."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018487"},{"key":"e_1_3_2_1_35_1","first-page":"14","volume-title":"Proceedings of the 20th USENIX Security Symposium","author":"Motoyama M.","year":"2011","unstructured":"M. Motoyama , D. McCoy , K. Levchenko , S. Savage , and G. M. Voelker . Dirty jobs: The role of freelance labor in web service abuse . In Proceedings of the 20th USENIX Security Symposium , pages 14 -- 14 . USENIX Association , 2011 . M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. Dirty jobs: The role of freelance labor in web service abuse. In Proceedings of the 20th USENIX Security Symposium, pages 14--14. USENIX Association, 2011."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.61"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2482626.2482663"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866410"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"e_1_3_2_1_40_1","volume-title":"Monte Carlo Statistical Methods","author":"Robert C. P.","year":"2005","unstructured":"C. P. Robert and G. Casella . Monte Carlo Statistical Methods . Springer-Verlag , 2005 . C. P. Robert and G. Casella. Monte Carlo Statistical Methods. Springer-Verlag, 2005."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844117"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1531514.1531530"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900556"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_49_1","first-page":"195","volume-title":"Proceedings of the 22nd USENIX Security Symposium","author":"Thomas K.","year":"2013","unstructured":"K. Thomas , D. McCoy , and C. Grier . Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse . In Proceedings of the 22nd USENIX Security Symposium , pages 195 -- 210 . USENIX Association , 2013 . K. Thomas, D. McCoy, and C. Grier. Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse. In Proceedings of the 22nd USENIX Security Symposium, pages 195--210. USENIX Association, 2013."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.112"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2012.6151333"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the WWW","volume":"12","author":"Wagner C.","year":"2012","unstructured":"C. Wagner , S. Mitter , C. K\u00f6rner , and M. Strohmaier . When social bots attack: Modeling susceptibility of users in online social networks . In Proceedings of the WWW , volume 12 , 2012 . C. Wagner, S. Mitter, C. K\u00f6rner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012."},{"key":"e_1_3_2_1_54_1","first-page":"1","volume-title":"Proceedings of the 22nd USENIX Security Symposium","author":"Wang G.","year":"2013","unstructured":"G. Wang , T. Konolige , C. Wilson , X. Wang , H. Zheng , and B. Y. Zhao . You are how you click: Clickstream analysis for sybil detection . In Proceedings of the 22nd USENIX Security Symposium , pages 1 -- 8 . USENIX Association , 2013 . G. Wang, T. Konolige, C. Wilson, X. Wang, H. Zheng, and B. Y. Zhao. You are how you click: Clickstream analysis for sybil detection. In Proceedings of the 22nd USENIX Security Symposium, pages 1--8. USENIX Association, 2013."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488038"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382235"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068841"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034575.2034593"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808769.2808772","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808769.2808772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:43Z","timestamp":1750223263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808769.2808772"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,16]]},"references-count":60,"alternative-id":["10.1145\/2808769.2808772","10.1145\/2808769"],"URL":"https:\/\/doi.org\/10.1145\/2808769.2808772","relation":{},"subject":[],"published":{"date-parts":[[2015,10,16]]},"assertion":[{"value":"2015-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}