{"id":"https://openalex.org/W2118346608","doi":"https://doi.org/10.1145/2379690.2379699","title":"Visual spam campaigns analysis using abstract graphs representation","display_name":"Visual spam campaigns analysis using abstract graphs representation","publication_year":2012,"publication_date":"2012-10-04","ids":{"openalex":"https://openalex.org/W2118346608","doi":"https://doi.org/10.1145/2379690.2379699","mag":"2118346608"},"language":"en","primary_location":{"id":"doi:10.1145/2379690.2379699","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2379690.2379699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048536546","display_name":"Orestis Tsigkas","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Orestis Tsigkas","raw_affiliation_strings":["Information Technologies Institute Thessaloniki, Greece","Information Technologies Institute, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Information Technologies Institute Thessaloniki, Greece","institution_ids":["https://openalex.org/I4210093649"]},{"raw_affiliation_string":"Information Technologies Institute, Thessaloniki, Greece","institution_ids":["https://openalex.org/I4210093649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076214057","display_name":"Olivier Thonnard","orcid":"https://orcid.org/0000-0003-2390-0346"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Olivier Thonnard","raw_affiliation_strings":["Symantec Research Labs, Sophia Antipolis, France","Symantec Research Labs, Sophia-Antipolis, France"],"affiliations":[{"raw_affiliation_string":"Symantec Research Labs, Sophia Antipolis, France","institution_ids":[]},{"raw_affiliation_string":"Symantec Research Labs, Sophia-Antipolis, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087452615","display_name":"Dimitrios Tzovaras","orcid":"https://orcid.org/0000-0001-6915-6722"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Dimitrios Tzovaras","raw_affiliation_strings":["Information Technologies Institute, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Information Technologies Institute, Thessaloniki, Greece","institution_ids":["https://openalex.org/I4210093649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048536546"],"corresponding_institution_ids":["https://openalex.org/I4210093649"],"apc_list":null,"apc_paid":null,"fwci":1.9218,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.88056102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.814278781414032},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.8036607503890991},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.796424388885498},{"id":"https://openalex.org/keywords/visual-analytics","display_name":"Visual analytics","score":0.7540276050567627},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.647844135761261},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5242241621017456},{"id":"https://openalex.org/keywords/spambot","display_name":"Spambot","score":0.5229623913764954},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4897732734680176},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.48868420720100403},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4671798348426819},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4627276659011841},{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.44865554571151733},{"id":"https://openalex.org/keywords/information-visualization","display_name":"Information visualization","score":0.44502848386764526},{"id":"https://openalex.org/keywords/graph-drawing","display_name":"Graph drawing","score":0.439419150352478},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.4174482226371765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41125449538230896},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3856493830680847},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.264987051486969},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.25495654344558716},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.24526554346084595}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.814278781414032},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.8036607503890991},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.796424388885498},{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.7540276050567627},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.647844135761261},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5242241621017456},{"id":"https://openalex.org/C127735637","wikidata":"https://www.wikidata.org/wiki/Q2306702","display_name":"Spambot","level":4,"score":0.5229623913764954},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4897732734680176},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.48868420720100403},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4671798348426819},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4627276659011841},{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.44865554571151733},{"id":"https://openalex.org/C185578843","wikidata":"https://www.wikidata.org/wiki/Q10609775","display_name":"Information visualization","level":3,"score":0.44502848386764526},{"id":"https://openalex.org/C112953755","wikidata":"https://www.wikidata.org/wiki/Q739462","display_name":"Graph drawing","level":3,"score":0.439419150352478},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.4174482226371765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41125449538230896},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3856493830680847},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.264987051486969},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25495654344558716},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.24526554346084595},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2379690.2379699","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2379690.2379699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth International Symposium on Visualization for Cyber Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1656697623","https://openalex.org/W1729411802","https://openalex.org/W1883466813","https://openalex.org/W1977496278","https://openalex.org/W1990517717","https://openalex.org/W1992654648","https://openalex.org/W2034694694","https://openalex.org/W2046842734","https://openalex.org/W2068306188","https://openalex.org/W2097481508","https://openalex.org/W2110277060","https://openalex.org/W2111495777","https://openalex.org/W2120329225","https://openalex.org/W2138199375","https://openalex.org/W2145640629","https://openalex.org/W2149857793","https://openalex.org/W2157530472","https://openalex.org/W2167482691","https://openalex.org/W2170014582"],"related_works":["https://openalex.org/W2124355208","https://openalex.org/W2958063430","https://openalex.org/W2969653794","https://openalex.org/W4307740390","https://openalex.org/W177515589","https://openalex.org/W2018000323","https://openalex.org/W2922891864","https://openalex.org/W4205869786","https://openalex.org/W2176994834","https://openalex.org/W1481472066"],"abstract_inverted_index":{"In":[0,115],"this":[1,157],"work":[2],"we":[3,117,154],"present":[4],"a":[5,10,23,37,101,146,179],"visual":[6,70],"analytics":[7,71],"tool":[8,72,99],"introducing":[9],"new":[11],"kind":[12],"of":[13,31,36,53,59,63,68,97,104,122,132,175,182],"graph":[14,55],"visualization":[15,45,56,60,161],"that":[16],"exploits":[17],"the":[18,32,95,120,130,133,137,150,172],"nodes'":[19],"degree":[20],"to":[21,49,74,82,128,144],"provide":[22,75],"simplified":[24],"and":[25,41,61,178],"more":[26],"abstract,":[27],"yet":[28],"accurate,":[29],"representation":[30],"most":[33],"important":[34],"elements":[35],"security":[38,76,160],"data":[39],"set":[40],"their":[42],"inter-relationships.":[43],"Our":[44],"technique":[46],"is":[47,73],"designed":[48],"address":[50],"two":[51],"shortcomings":[52],"existing":[54],"techniques:":[57],"scalability":[58],"comprehensibility":[62],"results.":[64],"The":[65],"main":[66],"goal":[67],"our":[69,98],"analysts":[77],"with":[78,156],"an":[79],"effective":[80],"way":[81],"reason":[83],"interactively":[84],"about":[85],"various":[86],"attack":[87],"phenomena":[88],"orchestrated":[89],"by":[90,107,112],"cyber":[91],"criminals.":[92],"We":[93],"demonstrate":[94],"use":[96],"on":[100,119,136,163],"large":[102],"corpus":[103],"spam":[105,109,113,123,141,152,176],"emails":[106],"visualizing":[108],"campaigns":[110],"performed":[111],"botnets.":[114],"particular,":[116],"focus":[118],"analysis":[121],"sent":[124],"in":[125,149],"March":[126],"2011":[127],"understand":[129],"impact":[131],"Rustock":[134],"takedown":[135],"botnet":[138],"ecosystem.":[139],"As":[140],"botnets":[142],"continue":[143],"play":[145],"significant":[147],"role":[148],"worldwide":[151],"problem,":[153],"show":[155],"application":[158],"how":[159],"based":[162],"abstract":[164],"graphs":[165],"can":[166],"help":[167],"us":[168],"gain":[169],"insights":[170],"into":[171],"strategic":[173],"behavior":[174],"botnets,":[177],"better":[180],"understanding":[181],"large-scale":[183],"spammers":[184],"operations.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":5},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
