{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:29:08Z","timestamp":1761676148556,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,25]],"date-time":"2013-08-25T00:00:00Z","timestamp":1377388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,25]]},"DOI":"10.1145\/2492517.2500225","type":"proceedings-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:40:06Z","timestamp":1389706806000},"page":"1358-1365","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Homing socialbots"],"prefix":"10.1145","author":[{"given":"Aviad","family":"Elyashar","sequence":"first","affiliation":[{"name":"Ben-Gurion University of the Negev, Sheva, Israel"}]},{"given":"Michael","family":"Fire","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Sheva, Israel"}]},{"given":"Dima","family":"Kagan","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Sheva, Israel"}]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Sheva, Israel"}]}],"member":"320","published-online":{"date-parts":[[2013,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0969-6989(02)00004-8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691612442904"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"e_1_3_2_1_4_1","unstructured":"Kristie Manning \"The impacts of Online Social Networking and Internet Use on Human Communication and Relationships\" 2009.  Kristie Manning \"The impacts of Online Social Networking and Internet Use on Human Communication and Relationships\" 2009."},{"key":"e_1_3_2_1_5_1","unstructured":"Somini Sengupta \"Facebook Delivers an Earnings Letdown\" The New York Times Business Day Technology July 26-th 2012. https:\/\/linproxy.fan.workers.dev:443\/http\/www.nytimes.com\/2012\/07\/27\/technology\/facebook-reports-a-loss-but-its-revenue-beats-expectations.html?ref=facebookinc  Somini Sengupta \"Facebook Delivers an Earnings Letdown\" The New York Times Business Day Technology July 26-th 2012. https:\/\/linproxy.fan.workers.dev:443\/http\/www.nytimes.com\/2012\/07\/27\/technology\/facebook-reports-a-loss-but-its-revenue-beats-expectations.html?ref=facebookinc"},{"key":"e_1_3_2_1_6_1","unstructured":"Facebook statistics https:\/\/linproxy.fan.workers.dev:443\/http\/newsroom.fb.com\/content\/default.aspx?NewsAreaId=22  Facebook statistics https:\/\/linproxy.fan.workers.dev:443\/http\/newsroom.fb.com\/content\/default.aspx?NewsAreaId=22"},{"key":"e_1_3_2_1_7_1","unstructured":"Yazan Boshmaf Ildar Muslukhov Konstantin Beznosov and Matei Ripeanu \"Design and Analysis of a Social Botnet\" July 9 2012.  Yazan Boshmaf Ildar Muslukhov Konstantin Beznosov and Matei Ripeanu \"Design and Analysis of a Social Botnet\" July 9 2012."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"issue":"4","key":"e_1_3_2_1_9_1","first-page":"39","article-title":"Organization Mining Using Online Social Networks","volume":"9","author":"Fire Michael","year":"2012","journal-title":"ACM Transactions on Embedded Computing Systems"},{"volume-title":"2012 ASE International Conference On Cyber Security, Washington D.C., USA.","author":"Elyashar Aviad","key":"e_1_3_2_1_10_1"},{"volume-title":"Proceedings of the Thirteenth Americas Conference on Information Systems","year":"2007","author":"Dwyer Catherine","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","first-page":"8","article-title":"Parallel Crawling for Online Social Networks","volume":"2007","author":"Chau Duen Horng","year":"2007","journal-title":"WWW"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_3_2_1_16_1","first-page":"5","article-title":"The Socialbot Network: When Bots Socialize for Fame and Money","volume":"11","author":"Boshmaf Yazan","year":"2011","journal-title":"ACSAC"},{"volume-title":"Proceedings of the 5th USENIX workshop on Large-scale exploits and emergent threats, LEET'12","author":"Boshmaf Yazan","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","first-page":"22","article-title":"Guard Your Connections: Infiltration of a Trust\/Reputation Based Network","volume":"2012","author":"Magdon-Ismail Malik","year":"2012","journal-title":"WebSci"},{"volume-title":"Association for the Advancement of Artificial Intelligence","year":"2013","author":"Stern Roni","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","article-title":"Facebook: 8.7 percent are fake users","author":"Protalinski Emil","year":"2012","journal-title":"Cnet, News, Internet & Media"}],"event":{"name":"ASONAM '13: Advances in Social Networks Analysis and Mining 2013","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Niagara Ontario Canada","acronym":"ASONAM '13"},"container-title":["Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2492517.2500225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/2492517.2500225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:37Z","timestamp":1750231717000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2492517.2500225"}},"subtitle":["intrusion on a specific organization's employee using Socialbots"],"short-title":[],"issued":{"date-parts":[[2013,8,25]]},"references-count":20,"alternative-id":["10.1145\/2492517.2500225","10.1145\/2492517"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/2492517.2500225","relation":{},"subject":[],"published":{"date-parts":[[2013,8,25]]},"assertion":[{"value":"2013-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}