{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T07:01:04Z","timestamp":1775199664587,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2126654"],"award-info":[{"award-number":["CNS-2126654"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714588","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:52:18Z","timestamp":1745362338000},"page":"1034-1045","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Poorest Man in Babylon: A Longitudinal Study of Cryptocurrency Investment Scams"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6616-546X","authenticated-orcid":false,"given":"Muhammad","family":"Muzammil","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3962-7092","authenticated-orcid":false,"given":"Abisheka","family":"Pitumpe","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4760-308X","authenticated-orcid":false,"given":"Xigao","family":"Li","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7361-1898","authenticated-orcid":false,"given":"Amir","family":"Rahmati","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9366-357X","authenticated-orcid":false,"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fraud Report","author":"Federal Bureau of Investigation.","year":"2023","unstructured":"Federal Bureau of Investigation. Federal Bureau of Investigation Cryptocurrency Fraud Report 2023. https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2023_ IC3CryptocurrencyReport.pdf. October 2024."},{"key":"e_1_3_2_1_2_1","unstructured":"Australian Competition and Consumer Commission. ACCC calls for united front as scammers steal over $3bn from Australians. https:\/\/www.accc.gov.au\/ media-release\/accc-calls-for-united-front-as-scammers-steal-over-3bnfrom-australians?utm_source=twitter_accc&utm_medium=social&utm_ campaign=p_tru_g_awa_c_scams&utm_content=targeting_scams_2023& sf176457037=1. October 2024."},{"key":"e_1_3_2_1_3_1","volume-title":"Over \u00a327 million reported lost to crypto and forex investment scams. https:\/\/www.fca.org.uk\/news\/press-releases\/over-27-million-reported-lost-crypto-and-forex-investment-scams","author":"Financial Conduct","year":"2024","unstructured":"Financial Conduct Authority (FCA). Over \u00a327 million reported lost to crypto and forex investment scams. https:\/\/www.fca.org.uk\/news\/press-releases\/over-27-million-reported-lost-crypto-and-forex-investment-scams. October 2024."},{"key":"e_1_3_2_1_4_1","volume-title":"Social media: a golden goose for scammers. https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/ 10\/social-media-golden-goose-scammers","author":"Federal Trade Commission (FTC).","year":"2024","unstructured":"Federal Trade Commission (FTC). Social media: a golden goose for scammers. https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/ 10\/social-media-golden-goose-scammers. October 2024."},{"key":"e_1_3_2_1_5_1","volume-title":"12 Instagram scams to know and avoid","year":"2024","unstructured":"Norton. 12 Instagram scams to know and avoid in 2024. https:\/\/us.norton.com\/ blog\/online-scams\/instagram-scams. October 2024."},{"key":"e_1_3_2_1_6_1","unstructured":"Charlelie (Ciicii) Mavusi. My Instagram account was hacked and I was tricked into promoting scam cryptocurrency. https:\/\/www.getsafeonline.org\/personal\/ blog-item\/my-instagram-account-was-hacked-and-i-was-tricked-intopromoting-scam-cryptocurrency\/. October 2024."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings Network and Distributed System Security Symposium.","author":"Li Xigao","year":"2024","unstructured":"Xigao Li, Amir Rahmati, and Nick Nikiforakis. \"Like, Comment, Get Scammed: Characterizing Comment Scams on Media Platforms\". In: Proceedings Network and Distributed System Security Symposium. 2024."},{"key":"e_1_3_2_1_8_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Bhupendra","year":"2024","unstructured":"Bhupendra Acharya et al. \"Conning the crypto conman: End-to-end analysis of cryptocurrency-based technical support scams\". In: IEEE Symposium on Security and Privacy 2024."},{"key":"e_1_3_2_1_9_1","first-page":"98","author":"Characterizing Cryptocurrency Exchange P. Xia","year":"2020","unstructured":"P. Xia et al. \"Characterizing Cryptocurrency Exchange Scams\". In: Computers & Security 98 (2020).","journal-title":"Computers & Security"},{"key":"e_1_3_2_1_10_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Li Xigao","year":"2023","unstructured":"Xigao Li, Anurag Yepuri, and Nick Nikiforakis. \"Double and nothing: Understanding and detecting cryptocurrency giveaway scams\". In: Network and Distributed System Security Symposium (NDSS). 2023."},{"key":"e_1_3_2_1_11_1","volume-title":"Symposium on Electronic Crime Research (eCrime). IEEE.","author":"Muhammad","year":"2024","unstructured":"Muhammad Muzammil et al. \"Typosquatting 3.0: Characterizing Squatting in Blockchain Naming Systems\". In: Symposium on Electronic Crime Research (eCrime). IEEE. 2024."},{"key":"e_1_3_2_1_12_1","volume-title":"ACM Internet Measurement Conference (IMC).","author":"Muhammad","year":"2024","unstructured":"Muhammad Muzammil et al. \"Panning for gold.eth: Understanding and Analyzing ENS Domain Dropcatching\". In: ACM Internet Measurement Conference (IMC). 2024."},{"key":"e_1_3_2_1_13_1","volume-title":"The Poorest Man in Babylon: Demonstration Video. https:\/\/www.youtube.com\/watch?v=1-vG0JRVfUM","author":"Muhammad Muzammil","year":"2024","unstructured":"Muhammad Muzammil et al. The Poorest Man in Babylon: Demonstration Video. https:\/\/www.youtube.com\/watch?v=1-vG0JRVfUM. October 2024."},{"key":"e_1_3_2_1_14_1","unstructured":"Muhammad Muzammil et. al. Crimson. https:\/\/github.com\/pragseclab\/Crimson."},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Security Symposium.","author":"Kondracki Brian","year":"2022","unstructured":"Brian Kondracki, Johnny So, and Nick Nikiforakis. \"Uninvited guests: Analyzing the identity and behavior of certificate transparency bots\". In: USENIX Security Symposium. 2022."},{"key":"e_1_3_2_1_16_1","volume-title":"International Symposium on Research in Attacks, Intrusions and Defenses.","author":"Mashael","year":"2022","unstructured":"Mashael AlSabah et al. \"Content-agnostic detection of phishing domains using certificate transparency and passive dns\". In: International Symposium on Research in Attacks, Intrusions and Defenses. 2022."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37231-6_18"},{"key":"e_1_3_2_1_18_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security.","author":"Brian","year":"2021","unstructured":"Brian Kondracki et al. \"Catching transparent phish: Analyzing and detecting mitm phishing toolkits\". In: ACM SIGSAC Conference on Computer and Communications Security. 2021."},{"key":"e_1_3_2_1_19_1","volume-title":"Certificate Transparency in Chrome. https:\/\/googlechrome.github.io\/ CertificateTransparency\/","year":"2024","unstructured":"Google. Certificate Transparency in Chrome. https:\/\/googlechrome.github.io\/ CertificateTransparency\/. July 2024."},{"key":"e_1_3_2_1_20_1","volume-title":"certstream-server. https:\/\/github.com\/CaliDog\/certstream-server","year":"2024","unstructured":"CaliDog. certstream-server. https:\/\/github.com\/CaliDog\/certstream-server. October 2024."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/github.com\/keredson\/wordninja","author":"Ninja Word","year":"2024","unstructured":"keredson. Word Ninja. https:\/\/github.com\/keredson\/wordninja. July 2024."},{"key":"e_1_3_2_1_22_1","volume-title":"https:\/\/urlscan.io\/","year":"2024","unstructured":"URLScan. URLScan. https:\/\/urlscan.io\/. July 2024."},{"key":"e_1_3_2_1_23_1","unstructured":"IBM. What is stemming? https:\/\/www.ibm.com\/topics\/stemming. Oct 2024."},{"key":"e_1_3_2_1_24_1","volume-title":"en. https : \/ \/ www. selenium . dev \/ documentation \/ webdriver\/","year":"2024","unstructured":"Selenium. WebDriver. en. https : \/ \/ www. selenium . dev \/ documentation \/ webdriver\/. September 2024."},{"key":"e_1_3_2_1_25_1","volume-title":"tesseract. https:\/\/github.com\/tesseract-ocr\/tesseract","year":"2024","unstructured":"tesseract-ocr. tesseract. https:\/\/github.com\/tesseract-ocr\/tesseract. July 2024."},{"key":"e_1_3_2_1_26_1","volume-title":"Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.\" In: NDSS","author":"Pieter Agten","year":"2015","unstructured":"Pieter Agten et al. \"Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.\" In: NDSS. 2015."},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symposium.","author":"Peiyu","year":"2024","unstructured":"Peiyu Liu et al. \"Exploring {ChatGPT's} Capabilities on Vulnerability Management\". In: USENIX Security Symposium. 2024."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security Symposium.","author":"Gelei","year":"2024","unstructured":"Gelei Deng et al. \"{PentestGPT}: Evaluating and Harnessing Large Language Models for Automated Penetration Testing\". In: USENIX Security Symposium. 2024."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3663548.3675633"},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium.","author":"Ruofan","year":"2024","unstructured":"Ruofan Liu et al. \"Less Defined Knowledge and More True Alarms: Referencebased Phishing Detection without a Pre-defined Reference List\". In: USENIX Security Symposium. 2024."},{"key":"e_1_3_2_1_31_1","volume-title":"KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection\". In: arXiv preprint arXiv:2403.02253","author":"Yuexin Li","year":"2024","unstructured":"Yuexin Li et al. \"KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection\". In: arXiv preprint arXiv:2403.02253 (2024)."},{"key":"e_1_3_2_1_32_1","volume-title":"LLMProxy: Reducing Cost to Access Large Language Models\". In: arXiv preprint arXiv:2410.11857","author":"Noah Martin","year":"2024","unstructured":"Noah Martin et al. \"LLMProxy: Reducing Cost to Access Large Language Models\". In: arXiv preprint arXiv:2410.11857 (2024)."},{"key":"e_1_3_2_1_33_1","volume-title":"IEEE Transactions on Visualization and Computer Graphics","author":"Yoonsang Kim","year":"2025","unstructured":"Yoonsang Kim et al. \"Explainable XR: Understanding User Behaviors of XR Environments using LLM-assisted Analytics Framework\". In: IEEE Transactions on Visualization and Computer Graphics (2025)."},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/www.mailinator.com\/","year":"2024","unstructured":"Mailinator. Mailinator. https:\/\/www.mailinator.com\/. July 2024."},{"key":"e_1_3_2_1_35_1","volume-title":"iocsearcher. https:\/\/github.com\/malicialab\/iocsearcher","author":"Lab Malicia","year":"2024","unstructured":"Malicia Lab. iocsearcher. https:\/\/github.com\/malicialab\/iocsearcher. September 2024."},{"key":"e_1_3_2_1_36_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security.","author":"Drakonakis Kostas","year":"2020","unstructured":"Kostas Drakonakis, Sotiris Ioannidis, and Jason Polakis. \"The cookie hunter: Automated black-box auditing for web authentication and authorization flaws\". In: ACM SIGSAC Conference on Computer and Communications Security. 2020."},{"key":"e_1_3_2_1_37_1","volume-title":"Tranco: A research-oriented top sites ranking hardened against manipulation\". In: arXiv preprint arXiv:1806.01156","author":"Pochat Victor Le","year":"2018","unstructured":"Victor Le Pochat et al. \"Tranco: A research-oriented top sites ranking hardened against manipulation\". In: arXiv preprint arXiv:1806.01156 (2018)."},{"key":"e_1_3_2_1_38_1","volume-title":"The rise of goodfatr: A novel accuracy comparison methodology for indicator extraction tools","author":"Juan Caballero","year":"2023","unstructured":"Juan Caballero et al. \"The rise of goodfatr: A novel accuracy comparison methodology for indicator extraction tools\". In: Future Generation Computer Systems (2023)."},{"key":"e_1_3_2_1_39_1","first-page":"56","year":"2023","unstructured":"Anup Kumar Sharma. Anup Kumar Sharma October 23, 2023 at 8:56 am. https: \/\/www.scam-detector.com\/crypto-info\/. October 2024.","journal-title":"Anup Kumar Sharma. Anup Kumar Sharma"},{"key":"e_1_3_2_1_40_1","volume-title":"How to find similarity between two words using NLP. https:\/\/www. educative.io\/answers\/how-to-find-similarity-between-two-words-usingnlp","year":"2024","unstructured":"Educative.io. How to find similarity between two words using NLP. https:\/\/www. educative.io\/answers\/how-to-find-similarity-between-two-words-usingnlp. October 2024."},{"key":"e_1_3_2_1_41_1","volume-title":"https:\/\/etherscan.io\/","year":"2024","unstructured":"Etherscan. Etherscan.io. https:\/\/etherscan.io\/. September 2024."},{"key":"e_1_3_2_1_42_1","volume-title":"Bitcoin Explorer - Blockstream.info. https:\/\/github.com\/ Blockstream\/esplora\/blob\/master\/API.md","year":"2024","unstructured":"Blockstream. Bitcoin Explorer - Blockstream.info. https:\/\/github.com\/ Blockstream\/esplora\/blob\/master\/API.md. September 2024."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623094"},{"key":"e_1_3_2_1_44_1","volume-title":"coinbase. https:\/\/www.coinbase.com\/","year":"2024","unstructured":"Coinbase. coinbase. https:\/\/www.coinbase.com\/. October 2024."},{"key":"e_1_3_2_1_45_1","volume-title":"binance. https:\/\/www.binance.com\/","year":"2024","unstructured":"Binance. binance. https:\/\/www.binance.com\/. October 2024."},{"key":"e_1_3_2_1_46_1","volume-title":"https:\/\/www.coincarp.com\/currencies\/bitcoin\/exchange-wallets\/","author":"Address List Exchange Wallet","year":"2024","unstructured":"CoinCarp. Bitcoin(BTC) Exchange Wallet Address List and Balance Change | CoinCarp. https:\/\/www.coincarp.com\/currencies\/bitcoin\/exchange-wallets\/. September 2024."},{"key":"e_1_3_2_1_47_1","unstructured":"Metamask. MetaMask. en. url: %5Curl%7Bhttps:\/\/metamask.io\/%7D."},{"key":"e_1_3_2_1_48_1","volume-title":"VirusTotal API v3 Overview. en. https : \/ \/ docs . virustotal . com \/ reference\/overview","year":"2024","unstructured":"VirusTotal. VirusTotal API v3 Overview. en. https : \/ \/ docs . virustotal . com \/ reference\/overview. September 2024."},{"key":"e_1_3_2_1_49_1","volume-title":"An ISAC Tailor-Made for Crypto, Blockchain, and Web3. https : \/\/isac.securityalliance.org\/","author":"ISAC.","year":"2024","unstructured":"SEAL-ISAC. An ISAC Tailor-Made for Crypto, Blockchain, and Web3. https : \/\/isac.securityalliance.org\/. October 2024."},{"key":"e_1_3_2_1_50_1","volume-title":"Safe Browsing -- Google Safe Browsing. en. https:\/\/safebrowsing.google. com\/","year":"2024","unstructured":"Google. Safe Browsing -- Google Safe Browsing. en. https:\/\/safebrowsing.google. com\/. September 2024."},{"key":"e_1_3_2_1_51_1","volume-title":"Protect your Crypto |Wallet Guard","year":"2024","unstructured":"WalletGuard. Protect your Crypto |Wallet Guard. September 2024. url: %5Curl% 7Bhttps:\/\/www.walletguard.app\/%7D."},{"key":"e_1_3_2_1_52_1","volume-title":"Protect your brand and revenue from attacks. https:\/\/www.phishfort. com\/","year":"2024","unstructured":"Phishfort. Protect your brand and revenue from attacks. https:\/\/www.phishfort. com\/. October 2024."},{"key":"e_1_3_2_1_53_1","volume-title":"Real-time Brand Protection for Leading Web3 Companies. https: \/\/chainpatrol.io\/","year":"2024","unstructured":"Chainpatrol. Real-time Brand Protection for Leading Web3 Companies. https: \/\/chainpatrol.io\/. October 2024."},{"key":"e_1_3_2_1_54_1","volume-title":"APWG symposium on electronic crime research. IEEE.","author":"Atondo Gilberto","year":"2022","unstructured":"Gilberto Atondo Siu et al. \"\"Invest in crypto!\": An analysis of investment scam advertisements found in Bitcointalk\". In: APWG symposium on electronic crime research. IEEE. 2022."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00023"},{"key":"e_1_3_2_1_56_1","volume-title":"ACM Asia Conference on Computer and Communications Security.","author":"Yazan","year":"2020","unstructured":"Yazan Boshmaf et al. \"Investigating MMM Ponzi scheme on bitcoin\". In: ACM Asia Conference on Computer and Communications Security. 2020."},{"key":"e_1_3_2_1_57_1","volume-title":"Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact","author":"Massimo Bartoletti","year":"2020","unstructured":"Massimo Bartoletti et al. \"Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact\". In: Future Generation Computer Systems (2020)."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the world wide web conference.","author":"Weili","year":"2018","unstructured":"Weili Chen et al. \"Detecting ponzi schemes on ethereum: Towards healthier blockchain technology\". In: Proceedings of the world wide web conference. 2018."},{"key":"e_1_3_2_1_59_1","volume-title":"Exploiting blockchain data to detect smart ponzi schemes on ethereum","author":"Weili Chen","year":"2019","unstructured":"Weili Chen et al. \"Exploiting blockchain data to detect smart ponzi schemes on ethereum\". In: IEEE Access (2019)."},{"key":"e_1_3_2_1_60_1","volume-title":"IEEE international conference on blockchain.","author":"Eunjin","year":"2019","unstructured":"Eunjin Jung et al. \"Data mining-based ethereum fraud detection\". In: IEEE international conference on blockchain. 2019."},{"key":"e_1_3_2_1_61_1","volume-title":"ACM Internet Measurement Conference","author":"Enze","year":"2024","unstructured":"Enze Liu et al. \"Give and take: An end-to-end investigation of giveaway scam conversion rates\". In: ACM Internet Measurement Conference 2024."},{"key":"e_1_3_2_1_62_1","volume-title":"IEEE International Conference on Blockchain.","author":"Li Kai","year":"2023","unstructured":"Kai Li, Darren Lee, and Shixuan Guan. \"Understanding the Cryptocurrency Free Giveaway Scam Disseminated on Twitter Lists\". In: IEEE International Conference on Blockchain. 2023."},{"key":"e_1_3_2_1_63_1","volume-title":"Review of Finance","author":"Dhawan Anirudh","year":"2023","unstructured":"Anirudh Dhawan and Talis J Putnins. \"A new wolf in town? Pump-and-dump manipulation in cryptocurrency markets\". In: Review of Finance (2023)."},{"key":"e_1_3_2_1_64_1","volume-title":"USENIX Security Symposium.","author":"Xu Jiahua","year":"2019","unstructured":"Jiahua Xu and Benjamin Livshits. \"The anatomy of a cryptocurrency {Pumpand-Dump} scheme\". In: USENIX Security Symposium. 2019."},{"key":"e_1_3_2_1_65_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security.","author":"Dipanjan","year":"2022","unstructured":"Dipanjan Das et al. \"Understanding security issues in the NFT ecosystem\". In: ACM SIGSAC Conference on Computer and Communications Security. 2022."},{"key":"e_1_3_2_1_66_1","volume-title":"ACM Internet Measurement Conference.","author":"Pengcheng","year":"2022","unstructured":"Pengcheng Xia et al. \"Challenges in decentralized name management: the case of ENS\". In: ACM Internet Measurement Conference. 2022."},{"key":"e_1_3_2_1_67_1","volume-title":"International AAAI Conference on Web and Social Media.","author":"Saha Sayak","year":"2024","unstructured":"Sayak Saha Roy et al. \"Unveiling the risks of NFT promotion scams\". In: International AAAI Conference on Web and Social Media. 2024."},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems","author":"Jintao","year":"2023","unstructured":"Jintao Huang et al. \"Miracle or mirage? a measurement study of nft rug pulls\". In: Proceedings of the ACM on Measurement and Analysis of Computing Systems (2023)."},{"key":"e_1_3_2_1_69_1","volume-title":"ACM Transactions on the Web","author":"Sharma Trishie","year":"2023","unstructured":"Trishie Sharma, Rachit Agarwal, and Sandeep Kumar Shukla. \"Understanding rug pulls: an in-depth behavioral analysis of fraudulent nft creators\". In: ACM Transactions on the Web (2023)."},{"key":"e_1_3_2_1_70_1","volume-title":"arXiv preprint arXiv:2412.15423","author":"Acharya Bhupendra","year":"2024","unstructured":"Bhupendra Acharya and Thorsten Holz. \"An Explorative Study of Pig Butchering Scams\". In: arXiv preprint arXiv:2412.15423 (2024)."},{"key":"e_1_3_2_1_71_1","volume-title":"APWG Symposium on Electronic Crime Research (eCrime). IEEE.","author":"Marilyne","year":"2024","unstructured":"Marilyne Ordekian et al. \"A sinister fattening: Dissecting the tales of pig butchering and other cryptocurrency scams\". In: APWG Symposium on Electronic Crime Research (eCrime). IEEE. 2024."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:33Z","timestamp":1750295913000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":71,"alternative-id":["10.1145\/3696410.3714588","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714588","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}