{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:23:53Z","timestamp":1775899433218,"version":"3.50.1"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":31,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"H2020 RISE Marie Sklodowska Curie action (MSCA)","award":["691925"],"award-info":[{"award-number":["691925"]}]},{"name":"Petroleum Technology Development Fund (PTDF)"},{"name":"EPSRC","award":["EP\/N008448\/1"],"award-info":[{"award-number":["EP\/N008448\/1"]}]},{"name":"EPSRC","award":["1490017"],"award-info":[{"award-number":["1490017"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1527086"],"award-info":[{"award-number":["CNS-1527086"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1145\/3038912.3052589","type":"proceedings-article","created":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T13:30:38Z","timestamp":1491485438000},"page":"1161-1170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["What's in a Name?"],"prefix":"10.1145","author":[{"given":"Enrico","family":"Mariconti","sequence":"first","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Jeremiah","family":"Onaolapo","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Syed Sharique","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Nicolas","family":"Nikiforou","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Manuel","family":"Egele","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23058"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.258"},{"key":"e_1_3_2_1_3_1","volume-title":"Detecting Spammers on Twitter. In Conference on Email and Anti-Spam (CEAS)","author":"Benevenuto F.","year":"2010","unstructured":"F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting Spammers on Twitter. In Conference on Email and Anti-Spam (CEAS), 2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_5_1","volume-title":"Measuring User Influence in Twitter: The Million Follower Fallacy. In International AAAI Conference on Weblogs and Social Media (ICWSM)","author":"Cha M.","year":"2010","unstructured":"M. Cha, H. Haddadi, F. Benvenuto, and K. Gummadi. Measuring User Influence in Twitter: The Million Follower Fallacy. In International AAAI Conference on Weblogs and Social Media (ICWSM), 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663729"},{"key":"e_1_3_2_1_7_1","volume-title":"Large-scale registration of domains with typographical errors","author":"Edelman B.","year":"2003","unstructured":"B. Edelman. Large-scale registration of domains with typographical errors. Harvard University, 2003."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Egele M.","year":"2013","unstructured":"M. Egele, G. Stringhini, C. Kruegel, and G. Vigna. COMPA: Detecting Compromised Accounts on Social Networks. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, February 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815699"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_11_1","volume-title":"A longitudinal measurement study of 4chan's politically incorrect forum and its effect on the web. arXiv preprint arXiv:1610.03452","author":"Hine G. E.","year":"2016","unstructured":"G. E. Hine, J. Onaolapo, E. De Cristofaro, N. Kourtellis, I. Leontiadis, R. Samaras, G. Stringhini, and J. Blackburn. A longitudinal measurement study of 4chan's politically incorrect forum and its effect on the web. arXiv preprint arXiv:1610.03452, 2016."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_13_1","volume-title":"Arxiv Preprint","author":"Jain P.","year":"2015","unstructured":"P. Jain and P. Kumaraguru. @i to @me: An anatomy of username changing behavior on twitter. Arxiv Preprint, 2015."},{"key":"e_1_3_2_1_14_1","volume-title":"Every second counts: Quantifying the negative externalities of cybercrime via typosquatting","author":"Khan M. T.","year":"2015","unstructured":"M. T. Khan, X. Huo, Z. Li, and C. Kanich. Every second counts: Quantifying the negative externalities of cybercrime via typosquatting. 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397741"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979104"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"e_1_3_2_1_18_1","volume-title":"WarningBird: Detecting Suspicious URLs in Twitter Stream. In Symposium on Network and Distributed System Security (NDSS)","author":"Lee S.","year":"2012","unstructured":"S. Lee and J. Kim. WarningBird: Detecting Suspicious URLs in Twitter Stream. In Symposium on Network and Distributed System Security (NDSS), 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409360.1409388"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2905760.2905762"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_15"},{"key":"e_1_3_2_1_22_1","volume-title":"Ethical research standards in a world of big data. F1000Research","author":"Rivers C. M.","year":"2014","unstructured":"C. M. Rivers and B. L. Lewis. Ethical research standards in a world of big data. F1000Research, 2014."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342551"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_25_1","volume-title":"EvilCohort: Detecting Communities of Malicious Accounts on Online Services. In USENIX Security Symposium","author":"Stringhini G.","year":"2015","unstructured":"G. Stringhini, P. Mourlanne, G. Jacob, M. Egele, C. Kruegel, and G. Vigna. EvilCohort: Detecting Communities of Malicious Accounts on Online Services. In USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symposium","author":"Szurdi J.","year":"2014","unstructured":"J. Szurdi, B. Kocso, G. Cseh, J. Spring, M. Felegyhazi, and C. Kanich. The long \"taile\" of typosquatting domain names. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.25"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium","author":"Thomas K.","year":"2013","unstructured":"K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse. In USENIX Security Symposium, 2013."},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)","author":"Wang Y.","year":"2006","unstructured":"Y. Wang, D. Beck, J. Wang, C. V., and B. Daniels. Strider typo-patrol: discovery and analysis of systematic typo-squatting. In USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2006."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Zhao Y.","year":"2009","unstructured":"Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. Botgraph: Large scale spamming botnet detection. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2009."}],"event":{"name":"WWW '17: 26th International World Wide Web Conference","location":"Perth Australia","acronym":"WWW '17","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 26th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3038912.3052589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3038912.3052589","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3038912.3052589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:06Z","timestamp":1750220646000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3038912.3052589"}},"subtitle":["Understanding Profile Name Reuse on Twitter"],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":31,"alternative-id":["10.1145\/3038912.3052589","10.5555\/3038912"],"URL":"https:\/\/doi.org\/10.1145\/3038912.3052589","relation":{},"subject":[],"published":{"date-parts":[[2017,4,3]]},"assertion":[{"value":"2017-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}