{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:03Z","timestamp":1750306083757,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3106543","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"737-744","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Understanding compromised accounts on Twitter"],"prefix":"10.1145","author":[{"given":"Courtland","family":"VanDam","sequence":"first","affiliation":[{"name":"Michigan State University"}]},{"given":"Jiliang","family":"Tang","sequence":"additional","affiliation":[{"name":"Michigan State University"}]},{"given":"Pang-Ning","family":"Tan","sequence":"additional","affiliation":[{"name":"Michigan State University"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Applied Logistic Regression Analysis. Applied Logistic Regression Analysis."},{"key":"e_1_3_2_1_2_1","unstructured":"Tripwire Guest Authors. 2015. What Happens to Hacked Social Media Accounts. Tripwire (2015). https:\/\/www.tripwire.com\/state-of-security\/security-awareness\/what-happens-to-hacked-social-media-accounts\/.  Tripwire Guest Authors. 2015. What Happens to Hacked Social Media Accounts. Tripwire (2015). https:\/\/www.tripwire.com\/state-of-security\/security-awareness\/what-happens-to-hacked-social-media-accounts\/."},{"volume-title":"Anti-Abuse and Spam Conference (CEAS.","year":"2010","author":"Benevenuto Fabr\u00edcio","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"e_1_3_2_1_5_1","unstructured":"Twitter Help Center. 2014. My account has been compromised. (2014). https:\/\/support.twitter.com\/articles\/31796-my-account-has-been-compromised.  Twitter Help Center. 2014. My account has been compromised. (2014). https:\/\/support.twitter.com\/articles\/31796-my-account-has-been-compromised."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_27"},{"key":"e_1_3_2_1_7_1","unstructured":"Anthony Cuthbertson. 2016. Hackers Hijack ISIS Twitter Accounts With Gay Porn After Orlando Attack. Newsweek (2016).  Anthony Cuthbertson. 2016. Hackers Hijack ISIS Twitter Accounts With Gay Porn After Orlando Attack. Newsweek (2016)."},{"volume-title":"COMPA: Detecting Compromised Accounts on Social Networks. In ISOC Network and Distributed System Security Symposium (NDSS).","year":"2013","author":"Egele Manuel","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488002"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.141"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2814058.2814061"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348525"},{"key":"e_1_3_2_1_15_1","unstructured":"David Mack. 2014. New York Gay Bar Claims It Was Hacked After Angry Tweets To Bill De Blasio And Al Sharpton. BuzzFeed News (2014).  David Mack. 2014. New York Gay Bar Claims It Was Hacked After Angry Tweets To Bill De Blasio And Al Sharpton. BuzzFeed News (2014)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/89.4.1409"},{"volume-title":"Technical Report","author":"Olmstead Kenneth","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"The Associated Press. 2016. U.S. indicts 3 it ties to Syrian Electronic Army for hacking. AP in the News (2016).  The Associated Press. 2016. U.S. indicts 3 it ties to Syrian Electronic Army for hacking. AP in the News (2016)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557330"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.9.5.635-643"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v61:12"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660282"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124320"},{"key":"e_1_3_2_1_27_1","unstructured":"Anthony J. Viera and Joanne M. Garrett. 2005. Understanding interobserver agreement: The kappa statistic. Family Medicine 37 5 (5 2005) 360--363.  Anthony J. Viera and Joanne M. Garrett. 2005. Understanding interobserver agreement: The kappa statistic. Family Medicine 37 5 (5 2005) 360--363."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488505"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554894"}],"event":{"name":"WI '17: International Conference on Web Intelligence 2017","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"],"location":"Leipzig Germany","acronym":"WI '17"},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106543","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3106543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:13Z","timestamp":1750217413000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":29,"alternative-id":["10.1145\/3106426.3106543","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3106543","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}