{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:01:55Z","timestamp":1743008515540,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":19,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461461692"},{"type":"electronic","value":"9781461461708"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-6170-8_294","type":"book-chapter","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T14:48:29Z","timestamp":1412434109000},"page":"1954-1960","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Spam Detection, E-mail\/Social Network"],"prefix":"10.1007","author":[{"given":"Cailing","family":"Dong","sequence":"first","affiliation":[]},{"given":"Bin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"issue":"5","key":"294_CR191121","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSP.2010.113","volume":"8","author":"S Abu-Nimeh","year":"2010","unstructured":"Abu-Nimeh S, Chen T (2010) Proliferation and detection of blog spam. IEEE Secur Priv 8(5):42\u201347","journal-title":"IEEE Secur Priv"},{"key":"294_CR191122","doi-asserted-by":"crossref","unstructured":"Boykin PO, Roychowdhury VP (2005) Leveraging social networks to fight spam. Computer 38(4):61\u201368. doi:\n                  http:\/\/dx.doi.org\/10.1109\/MC.2005.132","DOI":"10.1109\/MC.2005.132"},{"key":"294_CR191123","volume-title":"Proceedings of the fifth conference on email and anti-spam (CEAS'08)","author":"M Chang","year":"2008","unstructured":"Chang M, Yih W, McCann R (2008) Personalized spam filtering for gray mail. In: Proceedings of the fifth conference on email and anti-spam (CEAS'08). Mountain View, CA"},{"issue":"4","key":"294_CR191124","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1561\/1500000006","volume":"1","author":"GV Cormack","year":"2008","unstructured":"Cormack GV (2008) Email spam filtering: a systematic review. Found Trends Inf Retr 1(4):335\u2013455","journal-title":"Found Trends Inf Retr"},{"key":"294_CR191125","doi-asserted-by":"crossref","unstructured":"Dalvi N, Domingos P, Mausam, Sanghai S, Verma D (2004) Adversarial classification. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, KDD '04. ACM, New York, pp 99\u2013108. doi:10.1145\/1014052.1014066. \n                  http:\/\/doi.acm.org\/10.1145\/1014052.1014066","DOI":"10.1145\/1014052.1014066"},{"key":"294_CR191126","volume-title":"Proceedings of the 6th international conference on intelligent computer communication and processing (ICCP '10)","author":"L Firte","year":"2010","unstructured":"Firte L, Lemnaru C, Potolea R (2010) Spam detection filter using KNN algorithm and resampling. In: Proceedings of the 6th international conference on intelligent computer communication and processing (ICCP '10). Cluj-Napoca, Romania"},{"key":"294_CR191127","unstructured":"Fletcher D (2009) A brief history of spam. Time. \n                  http:\/\/www.time.com\/time\/business\/article\/0,8599,193 3796,00.html"},{"key":"294_CR191128","unstructured":"Fowler GA, Raice S, Efrati A (2012) Spam finds new target: Facebook and Twitter build up their defenses as hackers attack social networks. The Wall Street Journal"},{"key":"294_CR191129","volume-title":"First international workshop on adversarial information retrieval on the Web (AIRWeb'05)","author":"Z Gy\u00f6ngyi","year":"2005","unstructured":"Gy\u00f6ngyi Z, Garcia-Molina H (2005) Web spam taxonomy. In: First international workshop on adversarial information retrieval on the Web (AIRWeb'05). Chiba, Japan"},{"issue":"6","key":"294_CR191130","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann P, Koutrika G, Garcia-Molina H (2007) Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput 11(6):36\u201345","journal-title":"IEEE Internet Comput"},{"key":"294_CR191131","volume-title":"Proceedings of the fourth international conference on weblogs and social media","author":"D Irani","year":"2010","unstructured":"Irani D, Webb S, Pu C (2010) Study of static classification of social spam profiles in MySpace. In: Proceedings of the fourth international conference on weblogs and social media. Washington, DC"},{"key":"294_CR191132","unstructured":"Jennings R (2009) Cost of spam is flattening: our 2009 predictions. Ferris research. \n                  http:\/\/email-museum.com\/2009\/01\/28\/cost-of-spam-is-flattening-our-2009-predictions\/"},{"issue":"12","key":"294_CR191133","first-page":"1458","volume":"4","author":"X Jin","year":"2011","unstructured":"Jin X, Lin CX, Luo J, Han J (2011) Socialspamguard: a data mining-based spam detection system for social media networks. PVLDB 4(12):1458\u20131461","journal-title":"PVLDB"},{"key":"294_CR191134","volume-title":"Computer","author":"LD Paulson","year":"2004","unstructured":"Paulson LD (2004) Spam hits instant messaging. In: Computer, vol 37, issue 4. IEEE Computer Society Press, Los Alamitos"},{"key":"294_CR191135","volume-title":"Proceedings of the19th International Conference on Pattern Recognition","author":"TT Phuoc","year":"2008","unstructured":"Phuoc TT, Po-Hsiang T, Tony J (2008) An adjustable combination of linear regression and modified probabilistic neural network for anti-spam filtering. In: Proceedings of the19th International Conference on Pattern Recognition. Florida, USA"},{"key":"294_CR191136","unstructured":"Sahami M, Dumais S, Heckerman D, Horvitz E (1998) A bayesian approach to filtering junk E-mail. In: Learning for text categorization: papers from the 1998 workshop, AAAI Technical Report WS-98-05, Madison, Wisconsin. \n                  citeseer.ist.psu.edu\n                  \n                \/ \n                  sahami98bayesian.html"},{"key":"294_CR191137","doi-asserted-by":"crossref","unstructured":"Sebastiani F (2002) Machine learning in automated text categorization. ACM Comput Surv 34(1):1\u2013 47. doi10.1145\/505282.505283. \n                  http:\/\/doi.acm.org\/10.1145\/505282.505283","DOI":"10.1145\/505282.505283"},{"key":"294_CR191138","volume-title":"Proceedings of the 30th IEEE international conference on computer communications","author":"Y Shin","year":"2011","unstructured":"Shin Y, Gupta M, Myers SA (2011) Prevalence and mitigation of forum spamming. In: Proceedings of the 30th IEEE international conference on computer communications. Shanghai, China"},{"key":"294_CR191139","doi-asserted-by":"crossref","unstructured":"Zhang L, Zhu J, Yao T (2004) An evaluation of statistical spam filtering techniques. ACM Trans Asian Lang Inf Process 3(4)","DOI":"10.1145\/1039621.1039625"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-6170-8_294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:38:53Z","timestamp":1591051133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-6170-8_294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781461461692","9781461461708"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_294","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"5 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}