Detecting hidden propagation structure and its application to analyzing phishing | IEEE Conference Publication | IEEE Xplore