{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T06:35:47Z","timestamp":1770964547959,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,25]],"date-time":"2015-08-25T00:00:00Z","timestamp":1440460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004901","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de Minas Gerais","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004901","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alexander von Humboldt-Stiftung"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,25]]},"DOI":"10.1145\/2808797.2809292","type":"proceedings-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T14:56:02Z","timestamp":1447426562000},"page":"25-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Reverse Engineering Socialbot Infiltration Strategies in Twitter"],"prefix":"10.1145","author":[{"given":"Carlos","family":"Freitas","sequence":"first","affiliation":[{"name":"Universidade Federal de Minas Gerais, Belo Horizonte, Brazil"}]},{"given":"Fabricio","family":"Benevenuto","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais, Belo Horizonte, Brazil"}]},{"given":"Saptarshi","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems, Kaiserslautern--Saarbruecken, Germany and Indian Institute of Engineering Science and Technology Shibpur, India"}]},{"given":"Adriano","family":"Veloso","sequence":"additional","affiliation":[{"name":"Universidade Federal de Minas Gerais, Belo Horizonte, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"Creating a bot on Wikipedia \" http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Creating_a_bot.  \"Creating a bot on Wikipedia \" http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Creating_a_bot."},{"key":"e_1_3_2_1_2_1","unstructured":"\"Pandora Bots \" http:\/\/www.pandorabots.com\/.  \"Pandora Bots \" http:\/\/www.pandorabots.com\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"key":"e_1_3_2_1_4_1","volume-title":"Apr","author":"Edwards J.","year":"2013","unstructured":"J. Edwards , \"There Are 2 0 Million Fake Users On Twitter , And Twitter Can't Do Much About Them -- Business Insider,\" http:\/\/tinyurl.com\/twitter-20M-fake-users , Apr 2013 . J. Edwards, \"There Are 20 Million Fake Users On Twitter, And Twitter Can't Do Much About Them -- Business Insider,\" http:\/\/tinyurl.com\/twitter-20M-fake-users, Apr 2013."},{"key":"e_1_3_2_1_5_1","unstructured":"\"Let's make candidates pledge not to use bots \" http:\/\/blogs.reuters.com\/great-debate\/2014\/01\/02\/lets-make-candidates-pledge-not-to-use-bots\/.  \"Let's make candidates pledge not to use bots \" http:\/\/blogs.reuters.com\/great-debate\/2014\/01\/02\/lets-make-candidates-pledge-not-to-use-bots\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Anti-Abuse and Spam Conference (CEAS)","author":"Benevenuto F.","year":"2010","unstructured":"F. Benevenuto , G. Magno , T. Rodrigues , and V. Almeida , \" Detecting Spammers on Twitter,\" in Proc. Annual Collaboration, Electronic messaging , Anti-Abuse and Spam Conference (CEAS) , 2010 . F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, \"Detecting Spammers on Twitter,\" in Proc. Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010."},{"key":"e_1_3_2_1_7_1","volume-title":"AAAI International Conference on Web and Social Media (ICWSM)","author":"Lee K.","year":"2011","unstructured":"K. Lee , B. D. Eoff , and J. Caverlee , \" Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter,\" in Proc . AAAI International Conference on Web and Social Media (ICWSM) , 2011 . K. Lee, B. D. Eoff, and J. Caverlee, \"Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter,\" in Proc. AAAI International Conference on Web and Social Media (ICWSM), 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851226"},{"key":"e_1_3_2_1_9_1","volume-title":"Jul.","author":"Ferrara E.","year":"2014","unstructured":"E. Ferrara , O. Varol , C. Davis , F. Menczer , and A. Flammini , \" The Rise of Social Bots,\" ArXiv e-prints , Jul. 2014 , http:\/\/arxiv.org\/abs\/1407.5225. E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini, \"The Rise of Social Bots,\" ArXiv e-prints, Jul. 2014, http:\/\/arxiv.org\/abs\/1407.5225."},{"key":"e_1_3_2_1_10_1","volume-title":"You followed my bot! Transforming robots into influential users in Twitter,\" First Monday","author":"Messias J.","unstructured":"J. Messias , L. Schmidt , R. Rabelo , and F. Benevenuto , \" You followed my bot! Transforming robots into influential users in Twitter,\" First Monday , vol. 18 , no. 7, July 2013. J. Messias, L. Schmidt, R. Rabelo, and F. Benevenuto, \"You followed my bot! Transforming robots into influential users in Twitter,\" First Monday, vol. 18, no. 7, July 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"AAAI International Conference on Web and Social Media (ICWSM)","author":"Aiello L. M.","year":"2012","unstructured":"L. M. Aiello , M. Deplano , R. Schifanella , and G. Ruffo , \" People are Strange when you're a Stranger: Impact and Influence of Bots on Social Networks,\" in Proc . AAAI International Conference on Web and Social Media (ICWSM) , 2012 . L. M. Aiello, M. Deplano, R. Schifanella, and G. Ruffo, \"People are Strange when you're a Stranger: Impact and Influence of Bots on Social Networks,\" in Proc. AAAI International Conference on Web and Social Media (ICWSM), 2012."},{"key":"e_1_3_2_1_12_1","volume-title":"Measurement, Simulation, and Modeling","author":"Jain R.","year":"1991","unstructured":"R. Jain , The Art of Computer Systems Performance Analysis: Techniques for Experimental Design , Measurement, Simulation, and Modeling . John Wiley and Sons , INC , 1991 . R. Jain, The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling. John Wiley and Sons, INC, 1991."},{"key":"e_1_3_2_1_13_1","unstructured":"\"Klout --- The Standard for Influence \" http:\/\/klout.com\/.  \"Klout --- The Standard for Influence \" http:\/\/klout.com\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_15_1","volume-title":"Realboy: Belieavable Ttwitter Bots","author":"Coburn Z.","year":"2008","unstructured":"Z. Coburn and G. Marra , \" Realboy: Belieavable Ttwitter Bots ,\" 2008 , http:\/\/ca.olin.edu\/2008\/realboy\/. Z. Coburn and G. Marra, \"Realboy: Belieavable Ttwitter Bots,\" 2008, http:\/\/ca.olin.edu\/2008\/realboy\/."},{"key":"e_1_3_2_1_16_1","unstructured":"\"Web Ecology Project \" http:\/\/www.webecologyproject.org\/.  \"Web Ecology Project \" http:\/\/www.webecologyproject.org\/."},{"key":"e_1_3_2_1_17_1","volume-title":"Workshop on Making Sense of Microposts (with WWW)","author":"Wagner C.","year":"2012","unstructured":"C. Wagner , S. Mitter , C. K\u00f6rner , and M. Strohmaier , \" When social bots attack: Modeling susceptibility of users in online social networks,\" in Proc . Workshop on Making Sense of Microposts (with WWW) , 2012 . C. Wagner, S. Mitter, C. K\u00f6rner, and M. Strohmaier, \"When social bots attack: Modeling susceptibility of users in online social networks,\" in Proc. Workshop on Making Sense of Microposts (with WWW), 2012."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.30"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.30"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505615"},{"key":"e_1_3_2_1_21_1","volume-title":"European Conference on Artificial Intelligence","author":"Barbieri G.","year":"2012","unstructured":"G. Barbieri , F. Pachet , P. Roy , and M. D. Esposti , \" Markov Constraints for Generating Lyrics with Style,\" in Proc . European Conference on Artificial Intelligence , 2012 . G. Barbieri, F. Pachet, P. Roy, and M. D. Esposti, \"Markov Constraints for Generating Lyrics with Style,\" in Proc. European Conference on Artificial Intelligence, 2012."},{"key":"e_1_3_2_1_22_1","volume-title":"Computational Linguistics, and Speech Recognition","author":"Jurafsky D.","year":"2000","unstructured":"D. Jurafsky and J. H. Martin , Speech and Language Processing: An Introduction to Natural Language Processing , Computational Linguistics, and Speech Recognition , 1 st ed. Prentice Hall PTR , 2000 . D. Jurafsky and J. H. Martin, Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition, 1st ed. Prentice Hall PTR, 2000.","edition":"1"},{"key":"e_1_3_2_1_23_1","unstructured":"\"Shutting down spammers \" Apr 2012 https:\/\/blog.twitter.com\/2012\/shutting-down-spammers.  \"Shutting down spammers \" Apr 2012 https:\/\/blog.twitter.com\/2012\/shutting-down-spammers."},{"key":"e_1_3_2_1_24_1","volume-title":"AAAI International Conference on Web and Social Media (ICWSM)","author":"Cha M.","year":"2010","unstructured":"M. Cha , H. Haddadi , F. Benevenuto , and K. P. Gummadi , \" Measuring User Influence in Twitter: The Million Follower Fallacy,\" in Proc . AAAI International Conference on Web and Social Media (ICWSM) , 2010 . M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi, \"Measuring User Influence in Twitter: The Million Follower Fallacy,\" in Proc. AAAI International Conference on Web and Social Media (ICWSM), 2010."},{"key":"e_1_3_2_1_25_1","unstructured":"\"Klout -- Wikipedia \" http:\/\/en.wikipedia.org\/wiki\/Klout.  \"Klout -- Wikipedia \" http:\/\/en.wikipedia.org\/wiki\/Klout."},{"key":"e_1_3_2_1_26_1","volume-title":"Social Mirror","author":"Avison J. D. M.","year":"2007","unstructured":"J. D. M. William R. Avison and B. A. P. (Eds.), Mental Health , Social Mirror . Springer , 2007 . J. D. M. William R. Avison and B. A. P. (Eds.), Mental Health, Social Mirror. Springer, 2007."},{"key":"e_1_3_2_1_27_1","unstructured":"\"46% of Twitter users have less than 100 followers - Simplify360 \" http:\/\/simplify360.com\/blog\/46-of-twitter-users-have-less-than-100-followers\/.  \"46% of Twitter users have less than 100 followers - Simplify360 \" http:\/\/simplify360.com\/blog\/46-of-twitter-users-have-less-than-100-followers\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"e_1_3_2_1_29_1","volume-title":"AAAI International Conference on Web and Social Media (ICWSM)","author":"Kouloumpis E.","year":"2011","unstructured":"E. Kouloumpis , T. Wilson , and J. Moore , \" Twitter Sentiment Analysis: The Good, the Bad and the OMG!\" in Proc . AAAI International Conference on Web and Social Media (ICWSM) , 2011 . E. Kouloumpis, T. Wilson, and J. Moore, \"Twitter Sentiment Analysis: The Good, the Bad and the OMG!\" in Proc. AAAI International Conference on Web and Social Media (ICWSM), 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030376.2030387"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"e_1_3_2_1_32_1","unstructured":"M. Orcutt \"Twitter mischief plagues mexico's election \" http:\/\/www.technologyreview.com\/news\/428286\/twitter-mischief-plagues-mexicos-election\/ Jun. 2012.  M. Orcutt \"Twitter mischief plagues mexico's election \" http:\/\/www.technologyreview.com\/news\/428286\/twitter-mischief-plagues-mexicos-election\/ Jun. 2012."}],"event":{"name":"ASONAM '15: Advances in Social Networks Analysis and Mining 2015","location":"Paris France","acronym":"ASONAM '15","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"]},"container-title":["Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808797.2809292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808797.2809292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:34Z","timestamp":1750223254000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808797.2809292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,25]]},"references-count":32,"alternative-id":["10.1145\/2808797.2809292","10.1145\/2808797"],"URL":"https:\/\/doi.org\/10.1145\/2808797.2809292","relation":{},"subject":[],"published":{"date-parts":[[2015,8,25]]},"assertion":[{"value":"2015-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}