{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:57:27Z","timestamp":1760576247657,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","funder":[{"name":"German Federal Ministry of Education and Research","award":["BMBF grant 16KIS1900 &#x3f;UbiTrans&#x3f;"],"award-info":[{"award-number":["BMBF grant 16KIS1900 &#x3f;UbiTrans&#x3f;"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,28]]},"DOI":"10.1145\/3730567.3732927","type":"proceedings-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:39:24Z","timestamp":1760549964000},"page":"32-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploration of the Dynamics of Buy and Sale of Social Media Accounts"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7544-9577","authenticated-orcid":false,"given":"Mario","family":"Beluri","sequence":"first","affiliation":[{"name":"Saarland University, Saarland, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3663-152X","authenticated-orcid":false,"given":"Bhupendra","family":"Acharya","sequence":"additional","affiliation":[{"name":"CISPA, Saarland, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1052-4774","authenticated-orcid":false,"given":"Soheil","family":"Khodayari","sequence":"additional","affiliation":[{"name":"CISPA, Saarland, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7537-7797","authenticated-orcid":false,"given":"Giada","family":"Stivala","sequence":"additional","affiliation":[{"name":"CISPA, Saarland, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6223-8945","authenticated-orcid":false,"given":"Giancarlo","family":"Pellegrino","sequence":"additional","affiliation":[{"name":"CISPA, Saarland, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2783-1264","authenticated-orcid":false,"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"CISPA, Saarland, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Sahar Abdelnabi and Mario Fritz. 2023. {Fact-Saboteurs}: A Taxonomy of Evidence Manipulation Attacks against {Fact-Verification} Systems. In USENIX Security."},{"key":"e_1_3_2_1_2_1","volume-title":"Lea Sch\u00f6nherr, and Thorsten Holz.","author":"Acharya Bhupendra","year":"2024","unstructured":"Bhupendra Acharya, Dario Lazzaro, Efr\u00e9n L\u00f3pez-Morales, Adam Oest, Muhammad Saad, Antonio Emanuele Cin\u00e0, Lea Sch\u00f6nherr, and Thorsten Holz. 2024. The Imitation Game: Exploring Brand Impersonation Attacks on Social Media Platforms. In USENIX Security."},{"key":"e_1_3_2_1_3_1","volume-title":"Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. In IEEE Symposium on Security and Privacy (IEEE S&P).","author":"Acharya B.","unstructured":"B. Acharya, M. Saad, A. Emanuele Cin\u00e0, L. Sch\u00f6nherr, H. Dai Nguyen, A. Oest, P. Vadrevu, and T. Holz. 2024. Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. In IEEE Symposium on Security and Privacy (IEEE S&P)."},{"key":"e_1_3_2_1_4_1","volume-title":"Annual Conference on Privacy, Security and Trust (PST).","author":"Aggarwal Anupama","year":"2015","unstructured":"Anupama Aggarwal and Ponnurangam Kumaraguru. 2015. What they do in shadows: Twitter underground follower market. In Annual Conference on Privacy, Security and Trust (PST)."},{"key":"e_1_3_2_1_5_1","unstructured":"Apify. 2024. Apify Instagram Scraper API. https:\/\/apify.com\/apify\/instagramscraper."},{"key":"e_1_3_2_1_6_1","unstructured":"Apify. 2024. Facebook Scraper. https:\/\/apify.com\/streamers\/facebook-scraper."},{"key":"e_1_3_2_1_7_1","unstructured":"Apify. 2024. YouTube Scraper. https:\/\/apify.com\/streamers\/youtube-scraper."},{"key":"e_1_3_2_1_8_1","unstructured":"ARES. 2024. ARES Market. https:\/\/sn2sfdqay6cxztroslaxa36covrhoowe6a5xug6wlm6ek7nmeiujgvad.link\/."},{"key":"e_1_3_2_1_9_1","volume-title":"2023 IEEE Symposium on Security and Privacy (IEEE S&P).","author":"Bitaab Marzieh","year":"2023","unstructured":"Marzieh Bitaab, Haehyun Cho, Adam Oest, Zhuoer Lyu,WeiWang, Jorij Abraham, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, and Adam Doup\u00e9. 2023. Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale. In 2023 IEEE Symposium on Security and Privacy (IEEE S&P)."},{"key":"e_1_3_2_1_10_1","unstructured":"Greg Bowyer. 2016. CLD2-CFFI -- Python (CFFI) Bindings for Compact Language Detector 2. https:\/\/github.com\/GregBowyer\/cld2-cff."},{"key":"e_1_3_2_1_11_1","volume-title":"Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Cao Qiang","year":"2014","unstructured":"Qiang Cao, Xiaowei Yang, Jieqi Yu, and Christopher Palow. 2014. Uncovering Large Groups of Active Malicious Accounts in Online Social Networks. In ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_12_1","volume-title":"Anti-Abuse and Spam Conference (EMASC).","author":"Chhabra Sidharth","year":"2011","unstructured":"Sidharth Chhabra, Anupama Aggarwal, Fabricio Benevenuto, and Ponnurangam Kumaraguru. 2011. Phi.sh$oCiaL: the phishing landscape through short URLs. In Electronic Messaging, Anti-Abuse and Spam Conference (EMASC)."},{"key":"e_1_3_2_1_13_1","volume-title":"Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi.","author":"Cresci Stefano","year":"2015","unstructured":"Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2015. Fame for sale: Efficient detection of fake Twitter followers. Decision Support Systems (2015). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167923615001803"},{"key":"e_1_3_2_1_14_1","volume-title":"ACM SIGCOMM Conference on Internet Measurement Conference (IMC).","author":"DeKoven Louis F","year":"2018","unstructured":"Louis F DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M Voelker, and Nektarios Leontiadis. 2018. Following their footsteps: Characterizing account automation abuse and defenses. In ACM SIGCOMM Conference on Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_15_1","volume-title":"Compa: Detecting compromised accounts on social networks.. In Network and Distributed System Security (NDSS).","author":"Egele Manuel","year":"2013","unstructured":"Manuel Egele, Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2013. Compa: Detecting compromised accounts on social networks.. In Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_16_1","volume-title":"ACM SIGCOMM conference on Internet measurement (IMC).","author":"Gao Hongyu","year":"2010","unstructured":"Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen, and Ben Y Zhao. 2010. Detecting and characterizing social spam campaigns. In ACM SIGCOMM conference on Internet measurement (IMC)."},{"key":"e_1_3_2_1_17_1","volume-title":"ACM conference on Computer and communications security (CCS).","author":"Grier Chris","year":"2010","unstructured":"Chris Grier, Kurt Thomas, Vern Paxson, and Michael Zhang. 2010. @ spam: the underground on 140 characters or less. In ACM conference on Computer and communications security (CCS)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Maarten Grootendorst. 2020. KeyBERT: Minimal Keyword Extraction with BERT. https:\/\/doi.org\/10.5281\/zenodo.4461265.","DOI":"10.5281\/zenodo.4461265"},{"key":"e_1_3_2_1_19_1","volume-title":"BERTopic: Neural topic modeling with a class-based TF-IDF procedure. arXiv:2203.05794","author":"Grootendorst Maarten","year":"2022","unstructured":"Maarten Grootendorst. 2022. BERTopic: Neural topic modeling with a class-based TF-IDF procedure. arXiv:2203.05794 (2022)."},{"key":"e_1_3_2_1_20_1","unstructured":"IDRC. 2020. Social Media Scams are on the Rise as More People Use the Platforms to Connect. https:\/\/www.idtheftcenter.org\/post\/social-media-scams-are-on-therise-as-more-people-use-the-platforms-to-connect\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Mini Jain Peya Mowar Ruchika Goel and Dinesh K Vishwakarma. 2021. Clickbait in social media: detection and analysis of the bait. In Information Sciences and Systems (CISS).","DOI":"10.1109\/CISS50987.2021.9400293"},{"key":"e_1_3_2_1_22_1","unstructured":"Tom Huddleston Jr. 2023. Social Media Scams: Stunning Statistics and Tips to Protect Yourself. https:\/\/www.cnbc.com\/2023\/10\/12\/americans-lose-billions-tosocial-media-scams-red-flags-to-spot.html."},{"key":"e_1_3_2_1_23_1","unstructured":"Kerberos. 2024. Kerberos Market. http:\/\/kerberqtg7xpofsc3w47nvjd52sys6hqde jk3h7fz6kbqhyqrds3xgqd.onion\/."},{"key":"e_1_3_2_1_24_1","volume-title":"International Journal of Machine Learning and Computing","author":"Khalil Ashraf","year":"2017","unstructured":"Ashraf Khalil, Hassan Hajjdiab, and Nabeel Al-Qirim. 2017. Detecting fake followers in twitter: A machine learning approach. International Journal of Machine Learning and Computing (2017)."},{"key":"e_1_3_2_1_25_1","unstructured":"Zhengyi Li and Xiaojing Liao. 2024. Understanding and analyzing appraisal systems in the underground marketplaces. In Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_26_1","volume-title":"Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. arXiv arXiv:2401.03315","author":"Lin Zilong","year":"2024","unstructured":"Zilong Lin, Jian Cui, Xiaojing Liao, and XiaoFeng Wang. 2024. Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. arXiv arXiv:2401.03315 (2024)."},{"key":"e_1_3_2_1_27_1","volume-title":"IEEE International Conference on Service-Oriented System Engineering (SOSE).","author":"Lykousas Nikolaos","year":"2023","unstructured":"Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, and Constantinos Patsakis. 2023. The cynicism of modern cybercrime: Automating the analysis of surface web marketplaces. In IEEE International Conference on Service-Oriented System Engineering (SOSE)."},{"key":"e_1_3_2_1_28_1","volume-title":"Deconstructing a Form of Hybrid Investment Fraud: Examining 'Pig Butchering'in the United States. Journal of Economic Criminology","author":"Maras Marie-Helen","year":"2024","unstructured":"Marie-Helen Maras and Emily R Ives. 2024. Deconstructing a Form of Hybrid Investment Fraud: Examining 'Pig Butchering'in the United States. Journal of Economic Criminology (2024)."},{"key":"e_1_3_2_1_29_1","unstructured":"MGM Market. 2024. MGM Market. https:\/\/mgmsanjqxo4svh35yqkxxe5r54z2xc5tjf6r3ichxd3m2rwcgabf44ad.xyz\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Dark Matter. 2024. The Middleman Spring Sale. http:\/\/darkmmro6j5xekpe7jje74maidkkkkw265nngjqxrv4ik7v3aiwdbtad.onion\/."},{"key":"e_1_3_2_1_31_1","volume-title":"HDBSCAN: Hierarchical Density Based Clustering. Journal of Open Source Software","author":"McInnes Leland","year":"2017","unstructured":"Leland McInnes, John Healy, and Steve Astels. 2017. HDBSCAN: Hierarchical Density Based Clustering. Journal of Open Source Software (2017). https:\/\/joss.theoj.org\/"},{"key":"e_1_3_2_1_32_1","volume-title":"UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. arXiv arXiv:1802.03426","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes, John Healy, and James Melville. 2018. UMAP: Uniform Manifold Approximation and Projection for Dimension Reduction. arXiv arXiv:1802.03426 (2018)."},{"key":"e_1_3_2_1_33_1","volume-title":"International Conference on Contemporary Computing and Informatics (IC3I). In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).","author":"Mehrotra Ashish","year":"2016","unstructured":"Ashish Mehrotra, Mallidi Sarreddy, and Sanjay Singh. 2016. International Conference on Contemporary Computing and Informatics (IC3I). In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I)."},{"key":"e_1_3_2_1_34_1","unstructured":"Daniel Milevski. 2024. Apify Telegram Scraper API. https:\/\/apify.com\/danielmile vski9\/telegram-channel-scraper."},{"key":"e_1_3_2_1_35_1","unstructured":"Daniel Milevski. 2024. Telemetrio Telegram Scraper API. https:\/\/telemetr.io\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Dan Milmo. 2023. Sharp rise in blackmail of children asked to share explicit images. https:\/\/www.theguardian.com\/society\/2023\/may\/12\/sharp-rise-inblackmail-of-children-asked-to-share-explicit-images."},{"key":"e_1_3_2_1_37_1","volume-title":"Greg Ver Steeg, and Aram Galstyan","author":"Mirtaheri Mehrnoosh","year":"2021","unstructured":"Mehrnoosh Mirtaheri, Sami Abu-El-Haija, Fred Morstatter, Greg Ver Steeg, and Aram Galstyan. 2021. Identifying and analyzing cryptocurrency manipulations in social media. IEEE Transactions on Computational Social Systems (IEEE TCSS) (2021)."},{"key":"e_1_3_2_1_38_1","volume-title":"ACM SIGCOMM Conference on Internet Measurement Conference (IMC).","author":"Motoyama Marti","unstructured":"Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, and Geoffrey M. Voelker. 2011. An analysis of underground forums. In ACM SIGCOMM Conference on Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_39_1","unstructured":"MPNET. 2024. Sentence Transformer all-mpnet-base-v2. https:\/\/huggingface.co\/sentence-transformers\/all-mpnet-base-v2."},{"key":"e_1_3_2_1_40_1","author":"FTC","year":"2023","unstructured":"FTC News. 2023. FTC Data Shows Consumers Report Losing $2.7 Billion to Social Media Scams Since 2021. https:\/\/www.ftc.gov\/news-events\/news\/pressreleases\/2023\/10\/ftc-data-shows-consumers-report-losing-27-billion-socialmedia- scams-2021.","journal-title":"News."},{"key":"e_1_3_2_1_41_1","author":"FCA","year":"2024","unstructured":"FCA News. 2024. J'Finfluencers' charged for promoting unauthorised trading scheme. https:\/\/www.fca.org.uk\/news\/press-releases\/finfluencers-chargedpromoting-unauthorised-trading-scheme.","journal-title":"News."},{"key":"e_1_3_2_1_42_1","unstructured":"Web Protect News. [n. d.]. The rise of sextortion and responses to a growing crime. https:\/\/www.weprotect.org\/issue\/sextortion\/."},{"key":"e_1_3_2_1_43_1","unstructured":"Nexus. 2024. Next Generation Market. http:\/\/nexusabcdkq4pdlubs6wk6ad7pob uupzoomoxi6p7l32ci4vjtb2z7yd.onion\/."},{"key":"e_1_3_2_1_44_1","unstructured":"We The North. 2024. Canada We The North. http:\/\/hn2paw7zaahbikbejiv6h22z wtijlam65y2c77xj2ypbilm2xs4bnbid.onion\/."},{"key":"e_1_3_2_1_45_1","unstructured":"Madalina Popovici. 2024. Job Scams Report -- 2 670 Social Media Posts Reveal Scammers Top Tactics. https:\/\/heimdalsecurity.com\/blog\/job-scam-social-mediastudy\/."},{"key":"e_1_3_2_1_46_1","unstructured":"Alvaro Puig. 2023. Fake shipping notification emails and text messages: What you need to know this holiday season. https:\/\/consumer.ftc.gov\/consumeralerts\/ 2023\/12\/fake-shipping-notification-emails-and-text-messages-whatyou-need-know-holiday-season."},{"key":"e_1_3_2_1_47_1","unstructured":"Black Pyoc. 2024. Black Pyramid. http:\/\/blackpyoc3gbnrlvxqvvytd3kxqj7pd226i2 gvfyhysj24ne2snkmnyd.onion\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Nils Reimers and Iryna Gurevych. 2019. Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks. In Empirical Methods in Natural Language Processing (EMNLP).","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_1_49_1","volume-title":"Profiling Online Social Behaviors for Compromised Account Detection","author":"Ruan Xin","year":"2016","unstructured":"Xin Ruan, Zhenyu Wu, Haining Wang, and Sushil Jajodia. 2016. Profiling Online Social Behaviors for Compromised Account Detection. IEEE Transactions on Information Forensics and Security (ITIFS) (2016)."},{"key":"e_1_3_2_1_50_1","unstructured":"Nathan Sebastain. 2024. Social Media Scams: Stunning Statistics and Tips to Protect Yourself. https:\/\/www.goodfirms.co\/resources\/social-media-scamsstatistics-and-tips-for-protection."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Giada Stivala and Giancarlo Pellegrino. 2020. Deceptive previews: A study of the link preview trustworthiness in social platforms. (2020).","DOI":"10.14722\/ndss.2020.24252"},{"key":"e_1_3_2_1_52_1","volume-title":"Poultry markets: on the underground economy of twitter followers. ACM SIGCOMM Computer Communication Review","author":"Stringhini Gianluca","year":"2012","unstructured":"Gianluca Stringhini, Manuel Egele, Christopher Kruegel, and Giovanni Vigna. 2012. Poultry markets: on the underground economy of twitter followers. ACM SIGCOMM Computer Communication Review (2012)."},{"key":"e_1_3_2_1_53_1","volume-title":"Detecting Spammers on Social Networks. In Annual Computer Security Applications Conference (ACSAC).","author":"Stringhini Gianluca","year":"2010","unstructured":"Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2010. Detecting Spammers on Social Networks. In Annual Computer Security Applications Conference (ACSAC)."},{"key":"e_1_3_2_1_54_1","volume-title":"ACM SIGCOMM Conference on Internet Measurement Conference (IMC).","author":"Stringhini Gianluca","year":"2013","unstructured":"Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, and Ben Y Zhao. 2013. Follow the green: growth and dynamics in twitter follower markets. In ACM SIGCOMM Conference on Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_55_1","unstructured":"SysSec. 2024. Buy and Sale of Social Media Code and Data. https:\/\/github.com\/CISPA-SysSec\/social_media_buy_and_sale."},{"key":"e_1_3_2_1_56_1","unstructured":"Kurt Thomas Damon McCoy Chris Grier Alek Kolcz and Vern Paxson. 2013. {Trafficking} Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security."},{"key":"e_1_3_2_1_57_1","unstructured":"Torzon. 2024. TorZon Market. http:\/\/sglgj2fytneccvyn6n4u3pacj4zhdhscfoptnh xxes3uvljmontru2yd.onion\/."},{"key":"e_1_3_2_1_58_1","volume-title":"2015 Second European Network Intelligence Conference. European Network Intelligence Conference (ENIC).","author":"Tr\u00e5ng David","year":"2015","unstructured":"David Tr\u00e5ng, Fredrik Johansson, and Magnus Rosell. 2015. Evaluating algorithms for detection of compromised social media user accounts. In 2015 Second European Network Intelligence Conference. European Network Intelligence Conference (ENIC)."},{"key":"e_1_3_2_1_59_1","unstructured":"Twitter. 2024. User Detail Twitter API. https:\/\/developer.twitter.com\/en\/docs\/twitter-api\/v1\/accounts-and-users\/follow-search-get-users\/api-reference\/getusers-lookup."},{"key":"e_1_3_2_1_60_1","unstructured":"Twitter. 2024. User Timelines Twitter API. https:\/\/developer.twitter.com\/en\/doc s\/twitter-api\/tweets\/timelines\/introduction."},{"key":"e_1_3_2_1_61_1","unstructured":"Bimal Viswanath M Ahmad Bashir Mark Crovella Saikat Guha Krishna P Gummadi Balachander Krishnamurthy and Alan Mislove. 2014. Towards detecting anomalous user behavior in online social networks. In Usenix Security."},{"key":"e_1_3_2_1_62_1","unstructured":"Ryan Williams. 2024. The growth of fake products on social media. https:\/\/www.redpoints.com\/blog\/the-growth-of-fake-products-on-social-media\/."},{"key":"e_1_3_2_1_63_1","volume-title":"David Mandell Freeman, and Theodore Hwa","author":"Xiao Cao","year":"2015","unstructured":"Cao Xiao, David Mandell Freeman, and Theodore Hwa. 2015. Detecting clusters of fake accounts in online social networks. In ACMWorkshop on Artificial Intelligence and Security (AIS)."},{"key":"e_1_3_2_1_64_1","volume-title":"Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel","author":"Xu Teng","year":"2021","unstructured":"Teng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, and Paul Pearce. 2021. Deep entity classification: Abusive account detection for online social networks. In USENIX Security."}],"event":{"name":"IMC '25:ACM Internet Measurement Conference","location":"Madison WI USA","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX"]},"container-title":["Proceedings of the 2025 ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3730567.3732927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:41:12Z","timestamp":1760550072000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3730567.3732927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":64,"alternative-id":["10.1145\/3730567.3732927","10.1145\/3730567"],"URL":"https:\/\/doi.org\/10.1145\/3730567.3732927","relation":{},"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"2025-10-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}