References
[1] Z. Stanton, “You’re living in the golden age of
conspiracy theories - politico,” 6 2020. [Online]. Available:
https://www.politico.com/news/magazine/2020/06/17/conspiracy-
theories-pandemic-trump-2020-election-coronavirus-326530
[2] A. Bovet and H. A. Makse, “Influence of fake news in twitter during
the 2016 us presidential election,” Nature Communications, 2019.
[3] P. Ball and A. Maxmen, “The epic battle against coronavirus mis-
information and conspiracy theories.” Nature, 2020.
[4] S. Banaji, R. Bhat, A. Agarwal, N. Passanha, and M. Sad-
hana Pravin, “Whatsapp vigilantes: An exploration of citizen re-
ception and circulation of whatsapp misinformation linked to mob
violence in india,” 2019.
[5] H. W. Hanley, D. Kumar, and Z. Durumeric, “No calm in the storm:
investigating qanon website relationships,” in International AAAI
conference on Web and social media, 2022.
[6] S. Vosoughi, D. Roy, and S. Aral, “The spread of true and false
news online,” Science, vol. 359, no. 6380, pp. 1146–1151, 2018.
[7] K. Thomas, D. Akhawe, M. Bailey, D. Boneh, E. Bursztein, S. Con-
solvo, N. Dell, Z. Durumeric, P. G. Kelley, D. Kumar et al., “SoK:
Hate, harassment, and the changing landscape of online abuse,” in
IEEE Symposium on Security and Privacy, 2021.
[8] M. E. Zurko, “Disinformation and reflections from usable security,”
IEEE Security & Privacy, vol. 20, no. 3, pp. 4–7, 2022.
[9] M. Rajdev and K. Lee, “Fake and spam messages: Detecting mis-
information during natural disasters on social media,” in Intl. Conf.
on Web Intelligence and Intelligent Agent Technology, 2015.
[10] L. Wu, F. Morstatter, K. M. Carley, and H. Liu, “Misinforma-
tion in social media: definition, manipulation, and detection,” ACM
SIGKDD Explorations Newsletter, vol. 21, no. 2, pp. 80–90, 2019.
[11] M. H. Saeed, S. Ali, J. Blackburn, E. De Cristofaro, S. Zannettou,
and G. Stringhini, “Trollmagnifier: Detecting state-sponsored troll
accounts on reddit,” in IEEE Symposium on Security and Privacy.
[12] A. Hounsel, J. Holland, B. Kaiser, K. Borgolte, N. Feamster, and
J. Mayer, “Identifying disinformation websites using infrastructure
features,” in USENIX Workshop on Free and Open Communications
on the Internet, 2020.
[13] B. Kaiser, J. Wei, E. Lucherini, K. Lee, J. N. Matias, and J. Mayer,
“Adapting security warnings to counter online disinformation,” in
30th USENIX Security Symposium, 2021.
[14] P. Paudel, J. Blackburn, E. De Cristofaro, S. Zannettou, and
G. Stringhini, “Lambretta: learning to rank for twitter soft mod-
eration,” in IEEE Symposium on Security and Privacy, 2023.
[15] S. Zannettou, T. Caulfield, E. De Cristofaro, M. Sirivianos,
G. Stringhini, and J. Blackburn, “Disinformation warfare: Under-
standing state-sponsored trolls on twitter and their influence on the
web,” in World wide web conference, 2019.
[16] F. Plasser, “From hard to soft news standards? how political jour-
nalists in different media systems evaluate the shifting quality of
news,” Harvard International Journal of Press/Politics, 2005.
[17] J. Leskovec, L. Backstrom, and J. Kleinberg, “Meme-tracking and
the dynamics of the news cycle,” in 15th ACM SIGKDD interna-
tional conference on Knowledge discovery and data mining, 2009.
[18] K. Song, X. Tan, T. Qin, J. Lu, and T.-Y. Liu, “Mpnet: Masked and
permuted pre-training for language understanding,” Adv. in Neural
Information Processing Systems, 2020.
[19] Z. Durumeric, E. Wustrow, and J. A. Halderman, “ZMap: fast
internet-wide scanning and its security applications,” in 22nd
USENIX Security Symposium, 2013.
[20] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and
N. Weaver, “Inside the slammer worm,” IEEE Security & Privacy,
2003.
[21] S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy,
G. M. Voelker, and S. Savage, “A fistful of bitcoins: characterizing
payments among men with no names,” in ACM Internet measure-
ment conference, 2013.
[22] C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker,
V. Paxson, and S. Savage, “Spamalytics: An empirical analysis of
spam marketing conversion,” in 15th ACM conference on Computer
and communications security, 2008.
[23] M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M.
Voelker, “An analysis of underground forums,” in ACM Internet
measurement conference, 2011.
[24] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein,
J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallit-
sis et al., “Understanding the mirai botnet,” in 26th USENIX security
symposium, 2017.
[25] D. McCoy, A. Pitsillidis, J. Grant, N. Weaver, C. Kreibich, B. Krebs,
G. Voelker, S. Savage, and K. Levchenko, “PharmaLeaks: Under-
standing the business of online pharmaceutical affiliate programs,”
in 21st USENIX Security Symposium.
[26] S. Afroz, A. C. Islam, A. Stolerman, R. Greenstadt, and D. McCoy,
“Doppelg
¨
anger finder: Taking stylometry to the underground,” in
IEEE Symposium on Security and Privacy, 2014.
[27] E. Zeng, T. Kohno, and F. Roesner, “Bad news: Clickbait and
deceptive ads on news and misinformation websites,” in Workshop
on Technology and Consumer Protection, 2020.
[28] N. Heninger, Z. Durumeric, E. Wustrow, and J. A. Halderman,
“Mining your Ps and Qs: Detection of widespread weak keys in
network devices,” in 21st USENIX Security Symposium, 2012.
[29] C. Jack, “Lexicon of lies: Terms for problematic information,” Data
& Society, vol. 3, no. 22, pp. 1094–1096, 2017.
[30] S. Jiang and C. Wilson, “Linguistic signals under misinformation
and fact-checking: Evidence from user comments on social media,”
ACM CSCW, 2018.
[31] S. Lewandowsky, U. K. Ecker, C. M. Seifert, N. Schwarz, and
J. Cook, “Misinformation and its correction: Continued influence
and successful debiasing,” Psychological science in the public in-
terest, vol. 13, no. 3, pp. 106–131, 2012.
[32] H. Allcott, M. Gentzkow, and C. Yu, “Trends in the diffusion of
misinformation on social media,” Research & Politics, 2019.
[33] S. Z. Akbar, A. Panda, D. Kukreti, A. Meena, and J. Pal, “Misinfor-
mation as a window into prejudice: Covid-19 and the information
environment in india,” CSCW, 2021.
[34] K. Starbird, A. Arif, T. Wilson, K. Van Koevering, K. Yefimova,
and D. Scarnecchia, “Ecosystem or echo-system? exploring content
sharing across alternative media domains,” in International AAAI
Conference on Web and Social Media, 2018.
[35] J. Allan, “Detection as multi-topic tracking,” Information Retrieval,
vol. 5, no. 2-3, pp. 139–157, 2002.
[36] P. Devine and K. Blincoe, “Unsupervised extreme multi label clas-
sification of stack overflow posts,” in 1st International Workshop on
Natural Language-based Software Engineering, 2022.
[37] H. Jelodar, Y. Wang, C. Yuan, X. Feng, X. Jiang, Y. Li, and L. Zhao,
“Latent dirichlet allocation (lda) and topic modeling: models, appli-
cations, a survey,” Multimedia Tools and Applications, 2019.
[38] G. Leban, B. Fortuna, J. Brank, and M. Grobelnik, “Event registry:
learning about world events from news,” in 23rd International
Conference on World Wide Web, 2014.
[39] H. W. Hanley, D. Kumar, and Z. Durumeric, “Happenstance: Utiliz-
ing semantic search to track russian state media narratives about the
russo-ukrainian war on reddit,” in International AAAI conference on
web and social media, 2023.
[40] S. Miranda, A. Znotin¸
ˇ
s, S. B. Cohen, and G. Barzdins, “Multilingual
clustering of streaming news,” in Conference on Empirical Methods
in Natural Language Processing, 2018.