{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T15:32:13Z","timestamp":1756308733924,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,25]],"date-time":"2015-08-25T00:00:00Z","timestamp":1440460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/K03345X\/1"],"award-info":[{"award-number":["EP\/K03345X\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,25]]},"DOI":"10.1145\/2808797.2809281","type":"proceedings-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T14:56:02Z","timestamp":1447426562000},"page":"970-977","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Real-time Classification of Malicious URLs on Twitter using Machine Activity Data"],"prefix":"10.1145","author":[{"given":"Pete","family":"Burnap","sequence":"first","affiliation":[{"name":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK"}]},{"given":"Amir","family":"Javed","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK"}]},{"given":"Omer F.","family":"Rana","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK"}]},{"given":"Malik S.","family":"Awan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Informatics, Cardiff University, Cardiff, UK"}]}],"member":"320","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.41"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2013.774174"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0206-4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963436"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403023"},{"key":"e_1_3_2_1_7_1","first-page":"637","volume-title":"USENIX Security","author":"Kapravelos A.","year":"2013","unstructured":"A. Kapravelos , Y. Shoshitaishvili , M. Cova , C. Kruegel , and G. Vigna . Revolver: An automated approach to the detection of evasive web-based malware . In USENIX Security , pages 637 -- 652 , 2013 . A. Kapravelos, Y. Shoshitaishvili, M. Cova, C. Kruegel, and G. Vigna. Revolver: An automated approach to the detection of evasive web-based malware. In USENIX Security, pages 637--652, 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2011.71"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.05.068"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_1_12_1","volume-title":"NDSS","author":"Lee S.","year":"2012","unstructured":"S. Lee and J. Kim . Warningbird: Detecting suspicious urls in twitter stream . In NDSS , 2012 . S. Lee and J. Kim. Warningbird: Detecting suspicious urls in twitter stream. In NDSS, 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"Information contagion: an empirical study of the spread of news on digg and twitter social networks. CoRR, abs\/1003.2664","author":"Lerman K.","year":"2010","unstructured":"K. Lerman and R. Ghosh . Information contagion: an empirical study of the spread of news on digg and twitter social networks. CoRR, abs\/1003.2664 , 2010 . K. Lerman and R. Ghosh. Information contagion: an empirical study of the spread of news on digg and twitter social networks. CoRR, abs\/1003.2664, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.12.015"},{"volume-title":"Security intelligence report","year":"2013","key":"e_1_3_2_1_15_1","unstructured":"Microsoft. Security intelligence report . December 2013 . Microsoft. Security intelligence report. December 2013."},{"key":"e_1_3_2_1_16_1","volume-title":"In NDSS","author":"Wang Y.","year":"2006","unstructured":"Y. min Wang , D. Beck , X. Jiang , R. Roussev , C. Verbowski , S. Chen , and S. King . Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities . In In NDSS , 2006 . Y. min Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In In NDSS, 2006."},{"key":"e_1_3_2_1_17_1","first-page":"6","volume-title":"Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'09","author":"Nazario J.","year":"2009","unstructured":"J. Nazario . Phoneyc : A virtual client honeypot . In Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'09 , pages 6 -- 6 , Berkeley, CA, USA , 2009 . USENIX Association. J. Nazario. Phoneyc: A virtual client honeypot. In Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'09, pages 6--6, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2013.774172"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659717"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.06.090"},{"key":"e_1_3_2_1_22_1","volume-title":"Capture-hpc. Internet: https:\/\/projects.honeynet.org\/capture-hpc","author":"Seifert C.","year":"2008","unstructured":"C. Seifert and R. Steenson . Capture-hpc. Internet: https:\/\/projects.honeynet.org\/capture-hpc , 2008 . C. Seifert and R. Steenson. Capture-hpc. Internet: https:\/\/projects.honeynet.org\/capture-hpc, 2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342551"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665793"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v4i1.14009"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25206-8_21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOSN.2011.6060787"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_30_1","volume-title":"Detecting spam in a twitter network. First Monday, 15(1)","author":"Yardi S.","year":"2009","unstructured":"S. Yardi , D. Romero , G. Schoenebeck , and danah boyd. Detecting spam in a twitter network. First Monday, 15(1) , 2009 . S. Yardi, D. Romero, G. Schoenebeck, and danah boyd. Detecting spam in a twitter network. First Monday, 15(1), 2009."}],"event":{"name":"ASONAM '15: Advances in Social Networks Analysis and Mining 2015","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Paris France","acronym":"ASONAM '15"},"container-title":["Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808797.2809281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808797.2809281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:34Z","timestamp":1750223254000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808797.2809281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,25]]},"references-count":30,"alternative-id":["10.1145\/2808797.2809281","10.1145\/2808797"],"URL":"https:\/\/doi.org\/10.1145\/2808797.2809281","relation":{},"subject":[],"published":{"date-parts":[[2015,8,25]]},"assertion":[{"value":"2015-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}