{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:19:19Z","timestamp":1761581959355,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380165","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"848-859","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["The Chameleon Attack: Manipulating Content Display in Online Social Media"],"prefix":"10.1145","author":[{"given":"Aviad","family":"Elyashar","sequence":"first","affiliation":[{"name":"Telekom Innovation Laboratories and Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel"}]},{"given":"Sagi","family":"Uziel","sequence":"additional","affiliation":[{"name":"Telekom Innovation Laboratories and Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel"}]},{"given":"Abigail","family":"Paradise","sequence":"additional","affiliation":[{"name":"Telekom Innovation Laboratories and Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel"}]},{"given":"Rami","family":"Puzis","sequence":"additional","affiliation":[{"name":"Telekom Innovation Laboratories and Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"unstructured":"2012. Link Shim - Protecting the People who Use Facebook from Malicious URLs. https:\/\/www.facebook.com\/notes\/facebook-security\/link-shim-protecting-the-people-who-use-facebook-from-malicious-urls\/10150492832835766\/. Accessed: 2020-03-13.  2012. Link Shim - Protecting the People who Use Facebook from Malicious URLs. https:\/\/www.facebook.com\/notes\/facebook-security\/link-shim-protecting-the-people-who-use-facebook-from-malicious-urls\/10150492832835766\/. Accessed: 2020-03-13.","key":"e_1_3_2_1_1_1"},{"unstructured":"2020. Facebook Help how to edit. https:\/\/www.facebook.com\/help\/1376303972644600?helpref=related. Accessed: 2020-03-13.  2020. Facebook Help how to edit. https:\/\/www.facebook.com\/help\/1376303972644600?helpref=related. Accessed: 2020-03-13.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/j.techsoc.2010.07.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1007\/978-3-642-40597-6_20"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/SP.2009.3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/MIC.2006.117"},{"key":"e_1_3_2_1_7_1","first-page":"205","article-title":"Anti-content spoofing (ACS)","volume":"8","author":"Benea Robert","year":"2012","journal-title":"US Patent"},{"key":"e_1_3_2_1_8_1","first-page":"170","article-title":"How advanced persistent threats exploit humans","volume":"12","author":"Bere Mercy","year":"2015","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.3390\/a12080150"},{"volume-title":"Social engineering attack detection model: Seadm. In 2010 Information Security for South Africa","author":"Bezuidenhout Monique","doi-asserted-by":"crossref","key":"e_1_3_2_1_10_1","DOI":"10.1109\/ISSA.2010.5588500"},{"volume-title":"LockDown Conference proceedings.","year":"2010","author":"Blunden Bill","key":"e_1_3_2_1_11_1"},{"volume-title":"Meerkat: Detecting website defacements through image-based object recognition. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 595\u2013610.","year":"2015","author":"Borgolte Kevin","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2076732.2076746"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.2501\/S1470785309200669"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/ASONAM.2016.7752207"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"The rise in cybercrime and the dynamics of exploiting the human vulnerability factor","volume":"20","author":"Conteh Y","year":"2016","journal-title":"International Journal of Computer (IJC)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.19101\/IJACR.2016.623006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1016\/j.eswa.2011.04.038"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/2492517.2500225"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.3233\/AIC-140650"},{"volume-title":"Manipulation and abuse on social media by emilio ferrara with ching-man au yeung as coordinator. ACM SIGWEB NewsletterSpring","year":"2015","author":"Ferrara Emilio","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1518701.1518736"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.17705\/1jais.00447"},{"key":"e_1_3_2_1_26_1","first-page":"415","article-title":"Trending now: the use of social media websites in public shaming punishments","volume":"52","author":"Goldman M","year":"2015","journal-title":"Am. Crim. L. Rev."},{"key":"e_1_3_2_1_27_1","first-page":"60","article-title":"Whitehat website security statistics report","volume":"12","author":"Grossman Jeremiah","year":"2017","journal-title":"Retrieved March"},{"volume-title":"The threat of social engineering and your defense against it. SANS Reading Room","year":"2003","author":"Gulati Radha","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","first-page":"73","article-title":"An approach to reveal website defacement","volume":"11","author":"Gurjwar Rajiv\u00a0Kumar","year":"2013","journal-title":"International Journal of Computer Science and Information Security"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/DEST.2009.5276764"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/3287921.3287975"},{"unstructured":"Thorsten Holz Christian Gorecki Konrad Rieck and Felix\u00a0C Freiling. 2008. Measuring and Detecting Fast-Flux Service Networks.. In NDSS.  Thorsten Holz Christian Gorecki Konrad Rieck and Felix\u00a0C Freiling. 2008. Measuring and Detecting Fast-Flux Service Networks.. In NDSS.","key":"e_1_3_2_1_32_1"},{"volume-title":"International Conference on Intelligent Computing and Communication Technologies. Springer, 244\u2013252","year":"2019","author":"Hussain Syed\u00a0Zeeshan","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/SP.2016.50"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1109\/ISCIT.2014.7011911"},{"unstructured":"John\u00a0P John Fang Yu Yinglian Xie Arvind Krishnamurthy and Martin Abadi. 2011. deSEO: Combating Search-Result Poisoning.. In USENIX security symposium. 1\u201315.  John\u00a0P John Fang Yu Yinglian Xie Arvind Krishnamurthy and Martin Abadi. 2011. deSEO: Combating Search-Result Poisoning.. In USENIX security symposium. 1\u201315.","key":"e_1_3_2_1_36_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.9734\/BJAST\/2015\/14975"},{"key":"e_1_3_2_1_38_1","first-page":"307","article-title":"Implementing a web browser with web defacement detection techniques","volume":"1","author":"Kanti Tushar","year":"2011","journal-title":"World of Computer Science and Information Technology Journal (WCSIT)"},{"key":"e_1_3_2_1_39_1","first-page":"89","article-title":"Security against Web Application Attacks Using Ontology Based Intrusion Detection System","volume":"3","author":"Karandel A","year":"2016","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"volume-title":"The 7th International Workshop on Information Security Applications.","year":"2006","author":"Kim Woonyon","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1016\/S1389-1286(99)00050-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/1772690.1772751"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/1835449.1835522"},{"volume-title":"Seventh International AAAI Conference on Weblogs and Social Media.","year":"2013","author":"Lee Kyumin","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","first-page":"27","article-title":"Optimizing anti-phishing solutions based on user awareness, education and the use of the latest web security solutions","volume":"14","author":"Lungu Ion","year":"2010","journal-title":"Informatica Economica"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.4018\/irmj.2011070101"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.1145\/3196494.3196542"},{"volume-title":"Proc. 37th Technology of Object-Oriented Languages and Systems (TOOLS-37 Pacific 2000","year":"2000","author":"McDermott J","key":"e_1_3_2_1_48_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1109\/IAS.2007.35"},{"key":"e_1_3_2_1_50_1","first-page":"746","article-title":"Detecting unauthorised changes to website content","volume":"10","author":"Niemela Jarno","year":"2018","journal-title":"US Patent App."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_51_1","DOI":"10.1109\/TCSS.2017.2719705"},{"volume-title":"27th Virus Bulletin International Conference, Vol.\u00a01.","year":"2017","author":"Romagna Marco","key":"e_1_3_2_1_52_1"},{"key":"e_1_3_2_1_53_1","first-page":"728","article-title":"System and method for identification, prevention and management of web-sites defacement attacks","volume":"12","author":"Shani Oren","year":"2010","journal-title":"US Patent App."},{"volume-title":"Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms. In The Network and Distributed System Security Symposium (NDSS).","year":"2020","author":"Stivala Giada","key":"e_1_3_2_1_54_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1109\/STAST.2014.12"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1145\/2046707.2046763"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1145\/1242572.1242612"}],"event":{"sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"acronym":"WWW '20","name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan"},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:00Z","timestamp":1750199580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":57,"alternative-id":["10.1145\/3366423.3380165","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380165","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}