{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T14:11:44Z","timestamp":1770559904099,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T00:00:00Z","timestamp":1445990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,28]]},"DOI":"10.1145\/2815675.2815699","type":"proceedings-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T12:37:04Z","timestamp":1445949424000},"page":"141-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["The Doppelg\u00e4nger Bot Attack"],"prefix":"10.1145","author":[{"given":"Oana","family":"Goga","sequence":"first","affiliation":[{"name":"MPI-SWS, Saarbrucken, Germany"}]},{"given":"Giridhari","family":"Venkatadri","sequence":"additional","affiliation":[{"name":"MPI-SWS, Giridhari Venkatadri giridhar, Germany"}]},{"given":"Krishna P.","family":"Gummadi","sequence":"additional","affiliation":[{"name":"MPI-SWS, Saarbrucken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bing Maps API. http:\/\/www.microsoft.com\/maps\/developers\/web.aspx.  Bing Maps API. http:\/\/www.microsoft.com\/maps\/developers\/web.aspx."},{"key":"e_1_3_2_1_2_1","unstructured":"Get better results with less effort with Mechanical Turk Masters -- The Mechanical Turk blog. http:\/\/bit.ly\/112GmQI.  Get better results with less effort with Mechanical Turk Masters -- The Mechanical Turk blog. http:\/\/bit.ly\/112GmQI."},{"key":"e_1_3_2_1_3_1","volume-title":"CEAS'10","author":"Benevenuto F."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645765"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_6_1","volume-title":"NSDI'12","author":"Cao Q."},{"key":"e_1_3_2_1_7_1","volume-title":"IJCAI'03","author":"Cohen W. W."},{"key":"e_1_3_2_1_8_1","unstructured":"S. Corpus 2015. http:\/\/anoncvs.postgresql.org\/cvsweb.cgi\/pgsql\/src\/backend\/snowball\/stopwords\/.  S. Corpus 2015. http:\/\/anoncvs.postgresql.org\/cvsweb.cgi\/pgsql\/src\/backend\/snowball\/stopwords\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Universit\u00e9 Pierre et Marie Curie","author":"Goga O.","year":"2014"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788601"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.09.032"},{"key":"e_1_3_2_1_12_1","unstructured":"Internetnews. Microsoft survey: Online 'reputation' counts 2010. http:\/\/www.internetnews.com\/webcontent\/article.php\/3861241\/Microsoft+Survey+Online+Reputation+Counts.htm.  Internetnews. Microsoft survey: Online 'reputation' counts 2010. http:\/\/www.internetnews.com\/webcontent\/article.php\/3861241\/Microsoft+Survey+Online+Reputation+Counts.htm."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943520"},{"key":"e_1_3_2_1_14_1","unstructured":"A. M. Kakhki C. Kliman-Silver and A. Mislove. Iolaus: Securing online content rating systems. In WWW'13.  A. M. Kakhki C. Kliman-Silver and A. Mislove. Iolaus: Securing online content rating systems. In WWW'13."},{"key":"e_1_3_2_1_15_1","author":"Kharaji M. Y.","year":"2014","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_16_1","unstructured":"Klout. Klout 2014. http:\/\/klout.com\/.  Klout. Klout 2014. http:\/\/klout.com\/."},{"key":"e_1_3_2_1_17_1","volume-title":"PERCOM'11","author":"Kontaxis G."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_19_1","unstructured":"Mediabistro. Was twitter right to suspend 'christopher walken'? 2009. https:\/\/www.mediabistro.com\/alltwitter\/was-twitter-right-to-suspend-christopher-walken_b5021.  Mediabistro. Was twitter right to suspend 'christopher walken'? 2009. https:\/\/www.mediabistro.com\/alltwitter\/was-twitter-right-to-suspend-christopher-walken_b5021."},{"key":"e_1_3_2_1_20_1","volume-title":"NSDI'08","author":"Mislove A."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413214"},{"key":"e_1_3_2_1_22_1","unstructured":"Nairobiwire. Sonko's facebook impersonator arrested 2014. http:\/\/nairobiwire.com\/2014\/07\/mike-sonko-arrested-swindling-public.html?utm_source=rss&utm_medium=rss&utm_campaign=mike-sonko-arrested-swindling-public.  Nairobiwire. Sonko's facebook impersonator arrested 2014. http:\/\/nairobiwire.com\/2014\/07\/mike-sonko-arrested-swindling-public.html?utm_source=rss&utm_medium=rss&utm_campaign=mike-sonko-arrested-swindling-public."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032162.2032163"},{"key":"e_1_3_2_1_24_1","unstructured":"Phash. http:\/\/www.phash.org.  Phash. http:\/\/www.phash.org."},{"key":"e_1_3_2_1_25_1","volume-title":"NSDI'11","author":"Post A."},{"key":"e_1_3_2_1_26_1","unstructured":"Seattlepi. Racism and twitter impersonation prompt lawsuit for kirkland teen 2010. http:\/\/www.seattlepi.com\/local\/sound\/article\/Racism-and-Twitter-impersonation-prompt-lawsuit-893555.php.  Seattlepi. Racism and twitter impersonation prompt lawsuit for kirkland teen 2010. http:\/\/www.seattlepi.com\/local\/sound\/article\/Racism-and-Twitter-impersonation-prompt-lawsuit-893555.php."},{"key":"e_1_3_2_1_27_1","unstructured":"Social Intelligence Corp. http:\/\/www.socialintel.com\/.  Social Intelligence Corp. http:\/\/www.socialintel.com\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Spokeo. http:\/\/www.spokeo.com\/.  Spokeo. http:\/\/www.spokeo.com\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_30_1","unstructured":"Turnto23. Impersonator continuously creating fake facebook profiles of a well known bakersfield pastor. http:\/\/www.turnto23.com\/news\/local-news\/impersonator-continuously-creating-fake-facebook-profiles-of-a-bakersfield-pastor.  Turnto23. Impersonator continuously creating fake facebook profiles of a well known bakersfield pastor. http:\/\/www.turnto23.com\/news\/local-news\/impersonator-continuously-creating-fake-facebook-profiles-of-a-bakersfield-pastor."},{"key":"e_1_3_2_1_31_1","unstructured":"Twitter. Explaining twitter's efforts to shut down spam. https:\/\/blog.twitter.com\/2012\/shutting-down-spammers 2012.  Twitter. Explaining twitter's efforts to shut down spam. https:\/\/blog.twitter.com\/2012\/shutting-down-spammers 2012."},{"key":"e_1_3_2_1_32_1","unstructured":"Twitter. Twitter reporting impersonation accounts 2014. https:\/\/support.twitter.com\/articles\/20170142-reporting-impersonation-accounts.  Twitter. Twitter reporting impersonation accounts 2014. https:\/\/support.twitter.com\/articles\/20170142-reporting-impersonation-accounts."},{"key":"e_1_3_2_1_33_1","unstructured":"B. Viswanath M. A. Bashir M. Crovella S. Guha K. Gummadi B. Krishnamurthy and A. Mislove. Towards detecting anomalous user behavior in online social networks. In USENIX Security'14.   B. Viswanath M. A. Bashir M. Crovella S. Guha K. Gummadi B. Krishnamurthy and A. Mislove. Towards detecting anomalous user behavior in online social networks. In USENIX Security'14."},{"key":"e_1_3_2_1_34_1","unstructured":"B. Viswanath M. A. Bashir M. B. Zafar L. Espin K. P. Gummadi and A. Mislove. Trulyfollowing: Discover twitter accounts with suspicious followers. http:\/\/trulyfollowing.app-ns.mpi-sws.org\/ April 2012. Last accessed Sept 6 2015.  B. Viswanath M. A. Bashir M. B. Zafar L. Espin K. P. Gummadi and A. Mislove. Trulyfollowing: Discover twitter accounts with suspicious followers. http:\/\/trulyfollowing.app-ns.mpi-sws.org\/ April 2012. Last accessed Sept 6 2015."},{"key":"e_1_3_2_1_35_1","volume-title":"COMSNETS'12","author":"Viswanath B."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_1_37_1","volume-title":"NDSS'13","author":"Wang G."},{"key":"e_1_3_2_1_38_1","unstructured":"Wikibin. Employers using social networks for screening applicants 2008. http:\/\/wikibin.org\/articles\/employers-using-social-networks-for-screening-applicants.html.  Wikibin. Employers using social networks for screening applicants 2008. http:\/\/wikibin.org\/articles\/employers-using-social-networks-for-screening-applicants.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_1_40_1","volume-title":"PAM'11","author":"Zhang C. M."}],"event":{"name":"IMC '15: Internet Measurement Conference","location":"Tokyo Japan","acronym":"IMC '15","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2015 Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815699","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815675.2815699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815699"}},"subtitle":["Exploring Identity Impersonation in Online Social Networks"],"short-title":[],"issued":{"date-parts":[[2015,10,28]]},"references-count":40,"alternative-id":["10.1145\/2815675.2815699","10.1145\/2815675"],"URL":"https:\/\/doi.org\/10.1145\/2815675.2815699","relation":{},"subject":[],"published":{"date-parts":[[2015,10,28]]},"assertion":[{"value":"2015-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}