{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:33Z","timestamp":1750306053030,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":18,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3041021.3054733","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:39:25Z","timestamp":1515695965000},"page":"183-187","source":"Crossref","is-referenced-by-count":12,"title":["On-Demand Bot Detection and Archival System"],"prefix":"10.1145","author":[{"given":"Nikan","family":"Chavoshi","sequence":"first","affiliation":[{"name":"University of New Mexico, Albuquerque, NM, USA"}]},{"given":"Hossein","family":"Hamooni","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, NM, USA"}]},{"given":"Abdullah","family":"Mueen","sequence":"additional","affiliation":[{"name":"University of New Mexico, Albuquerque, NM, USA"}]}],"member":"320","reference":[{"key":"key-10.1145\/3041021.3054733-1","unstructured":"A video screen capture of our services. http:\/\/www.cs.unm.edu\/~chavoshi\/debot\/screencast.html."},{"key":"key-10.1145\/3041021.3054733-2","unstructured":"Bot or not? a truthy project. http:\/\/truthy.indiana.edu\/botornot\/."},{"key":"key-10.1145\/3041021.3054733-3","unstructured":"Debot api on github. https:\/\/github.com\/nchavoshi\/debot_api."},{"key":"key-10.1145\/3041021.3054733-4","unstructured":"Supporting Page -- Supporting webpage containing video, data, code and daily report. www.cs.unm.edu\/~chavoshi\/debot."},{"key":"key-10.1145\/3041021.3054733-5","unstructured":"Twitter Streaming API. https:\/\/dev.twitter.com\/streaming\/overview."},{"key":"key-10.1145\/3041021.3054733-6","doi-asserted-by":"crossref","unstructured":"A. Beutel, W. Xu, V. Guruswami, C. Palow, and C. Faloutsos. Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In Proceedings of the 22nd international conference on World Wide Web, pages 119--130. International World Wide Web Conferences Steering Committee, 2013.","DOI":"10.1145\/2488388.2488400"},{"key":"key-10.1145\/3041021.3054733-7","doi-asserted-by":"crossref","unstructured":"N. Chavoshi, H. Hamooni, and A. Mueen. Debot: Twitter bot detection via warped correlation. In IEEE International Conference on Data Mining (ICDM), 2016.","DOI":"10.1109\/ICDM.2016.0096"},{"key":"key-10.1145\/3041021.3054733-8","doi-asserted-by":"crossref","unstructured":"N. Chavoshi, H. Hamooni, and A. Mueen. Identifying correlated bots in twitter. In Social Informatics - 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II, pages 14--21, 2016.","DOI":"10.1007\/978-3-319-47874-6_2"},{"key":"key-10.1145\/3041021.3054733-9","doi-asserted-by":"crossref","unstructured":"C. A. Davis, O. Varol, E. Ferrara, A. Flammini, and F. Menczer. Botornot: A system to evaluate social bots. In Proceedings of the 25th International Conference Companion on World Wide Web, WWW '16 Companion, pages 273--274, Republic and Canton of Geneva, Switzerland, 2016. International World Wide Web Conferences Steering Committee.","DOI":"10.1145\/2872518.2889302"},{"key":"key-10.1145\/3041021.3054733-10","unstructured":"E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini. The rise of social bots. arXiv preprint arXiv:1407.5225, 2014."},{"key":"key-10.1145\/3041021.3054733-11","doi-asserted-by":"crossref","unstructured":"S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twitter social network. In Proceedings of the 21st international conference on World Wide Web - WWW '12, page~61, New York, New York, USA, Apr. 2012. ACM Press.","DOI":"10.1145\/2187836.2187846"},{"key":"key-10.1145\/3041021.3054733-12","doi-asserted-by":"crossref","unstructured":"O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira. Exploiting innocuous activity for correlating users across sites. pages 447--458, May 2013.","DOI":"10.1145\/2488388.2488428"},{"key":"key-10.1145\/3041021.3054733-13","doi-asserted-by":"crossref","unstructured":"C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: the underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and communications security - CCS '10, page~27, New York, New York, USA, Oct. 2010. ACM Press.","DOI":"10.1145\/1866307.1866311"},{"key":"key-10.1145\/3041021.3054733-14","doi-asserted-by":"crossref","unstructured":"H. Hamooni, N. Chavoshi, and A. Mueen. On URL changes and handovers in social media. In Social Informatics - 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part I, pages 58--74, 2016.","DOI":"10.1007\/978-3-319-47880-7_4"},{"key":"key-10.1145\/3041021.3054733-15","doi-asserted-by":"crossref","unstructured":"J. Jiang, Z.-F. Shan, X. Wang, L. Zhang, and Y.-F. Dai. Understanding sybil groups in the wild. Journal of Computer Science and Technology, 30(6):1344--1357, 2015.","DOI":"10.1007\/s11390-015-1602-6"},{"key":"key-10.1145\/3041021.3054733-16","unstructured":"K. Thomas, V. Paxson, D. Mccoy, and C. Grier. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse Trafficking Fraudulent Accounts. In USENIX Security Symposium, pages 195--210, 2013."},{"key":"key-10.1145\/3041021.3054733-17","doi-asserted-by":"crossref","unstructured":"S. Uhlmann and A. Lugmayr. Personalization algorithms for portable personality. In Proceedings of the 12th International Conference on Entertainment and Media in the Ubiquitous Era, MindTrek '08, pages 117--121, New York, NY, USA, 2008. ACM.","DOI":"10.1145\/1457199.1457225"},{"key":"key-10.1145\/3041021.3054733-18","doi-asserted-by":"crossref","unstructured":"C. M. Zhang and V. Paxson. Detecting and analyzing automated activity on twitter. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 6579 LNCS of PAM'11, pages 102--111, 2011.","DOI":"10.1007\/978-3-642-19260-9_11"}],"event":{"number":"26","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"acronym":"WWW '17 Companion","name":"the 26th International Conference","start":{"date-parts":[[2017,4,3]]},"location":"Perth, Australia","end":{"date-parts":[[2017,4,7]]}},"container-title":["Proceedings of the 26th International Conference on World Wide Web Companion - WWW '17 Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041021.3054733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3054733&ftid=1865202&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:30Z","timestamp":1750215810000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3041021.3054733"}},"subtitle":[],"proceedings-subject":"World Wide Web Companion","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1145\/3041021.3054733","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}