{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:54:49Z","timestamp":1769828089697,"version":"3.49.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030396268","type":"print"},{"value":"9783030396275","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39627-5_7","type":"book-chapter","created":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T10:46:14Z","timestamp":1580813174000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Detecting Malicious Social Bots: Story of a Never-Ending Clash"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0170-2445","authenticated-orcid":false,"given":"Stefano","family":"Cresci","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"key":"7_CR1","unstructured":"Assenmacher, D., Adam, L., Frischlich, L., Trautmann, H., Grimme, C.: Openbots. arXiv preprint arXiv:1902.06691 (2019)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Avvenuti, M., Bellomo, S., Cresci, S., La Polla, M.N., Tesconi, M.: Hybrid crowdsensing: a novel paradigm to combine the strengths of opportunistic and participatory crowdsensing. In: ACM WWW Companion (2017)","DOI":"10.1145\/3041021.3051155"},{"issue":"5","key":"7_CR3","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s10796-018-9833-z","volume":"20","author":"M Avvenuti","year":"2018","unstructured":"Avvenuti, M., Cresci, S., Del Vigna, F., Fagni, T., Tesconi, M.: CrisMap: a big data crisis mapping system based on damage detection and geoparsing. Inf. Syst. Front. 20(5), 993\u20131011 (2018)","journal-title":"Inf. Syst. Front."},{"issue":"6","key":"7_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MIC.2016.115","volume":"20","author":"Marco Avvenuti","year":"2016","unstructured":"Avvenuti, M., Cresci, S., Marchetti, A., Meletti, C., Tesconi, M.: Predictability or early warning: using social media in modern emergency response. IEEE Internet Comput. 20(6) (2016)","journal-title":"IEEE Internet Computing"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Chavoshi, N., Hamooni, H., Mueen, A.: DeBot: Twitter bot detection via warped correlation. In: IEEE ICDM (2016)","DOI":"10.1109\/ICDM.2016.0096"},{"key":"7_CR6","unstructured":"Cresci, S.: Harnessing the social sensing revolution: challenges and opportunities. Ph.D. dissertation, University of Pisa (2018)"},{"key":"7_CR7","unstructured":"Cresci, S., D\u2019Errico, A., Gazz\u00e9, D., Lo Duca, A., Marchetti, A., Tesconi, M.: Towards a DBpedia of tourism: the case of Tourpedia. In: ISWC (2014)"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"Stefano Cresci","year":"2015","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: Fame for sale: efficient detection of fake Twitter followers. Decis. Support Syst. 80 (2015)","journal-title":"Decision Support Systems"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Cresci, S., Di Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: ACM WWW Companion (2017)","DOI":"10.1145\/3041021.3055135"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/3313184","volume":"13","author":"S Cresci","year":"2019","unstructured":"Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on Twitter. ACM Trans. Web 13(2), 11 (2019)","journal-title":"ACM Trans. Web"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Cresci, S., Petrocchi, M., Spognardi, A., Tognazzi, S.: From reaction to proaction: unexplored ways to the detection of evolving spambots. In: ACM WWW Companion (2018)","DOI":"10.1145\/3184558.3191595"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Cresci, S., Petrocchi, M., Spognardi, A., Tognazzi, S.: Better safe than sorry: an adversarial approach to improve social bot detection. In: ACM WebSci (2019)","DOI":"10.1145\/3292522.3326030"},{"issue":"4","key":"7_CR13","first-page":"561","volume":"15","author":"S Cresci","year":"2018","unstructured":"Cresci, S., Pietro, R.D., Petrocchi, M., Spognardi, A., Tesconi, M.: Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE Trans. Dependable Secure Comput. 15(4), 561\u2013576 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"7_CR14","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1109\/TITS.2015.2404431","volume":"16","author":"E D\u2019Andrea","year":"2015","unstructured":"D\u2019Andrea, E., Ducange, P., Lazzerini, B., Marcelloni, F.: Real-time detection of traffic from Twitter stream analysis. IEEE Trans. Intell. Transp. Syst. 16(4), 2269\u20132283 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: BotOrNot: a system to evaluate social bots. In: ACM WWW Companion (2016)","DOI":"10.1145\/2872518.2889302"},{"key":"7_CR16","unstructured":"De Cristofaro, E., Kourtellis, N., Leontiadis, I., Stringhini, G., Zhou, S., et al.: LOBO: evaluation of generalization deficiencies in Twitter bot classifiers. In: ACM ACSAC (2018)"},{"issue":"8","key":"7_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/3299768","volume":"62","author":"E Ferrara","year":"2019","unstructured":"Ferrara, E.: The history of digital spam. Commun. ACM 62(8), 82\u201391 (2019)","journal-title":"Commun. ACM"},{"issue":"7","key":"7_CR18","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"Emilio Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Communun. ACM 59(7) (2016)","journal-title":"Communications of the ACM"},{"issue":"7","key":"7_CR19","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3134599","volume":"61","author":"IJ Goodfellow","year":"2018","unstructured":"Goodfellow, I.J., McDaniel, P.D., Papernot, N.: Making machine learning robust against adversarial inputs. Communun. ACM 61(7), 56\u201366 (2018)","journal-title":"Communun. ACM"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-319-91521-0_32","volume-title":"Social Computing and Social Media. User Experience and Behavior","author":"C Grimme","year":"2018","unstructured":"Grimme, C., Assenmacher, D., Adam, L.: Changing perspectives: is it sufficient to detect social bots? In: Meiselwitz, G. (ed.) SCSM 2018. LNCS, vol. 10913, pp. 445\u2013461. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91521-0_32"},{"issue":"4","key":"7_CR21","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1089\/big.2017.0044","volume":"5","author":"Christian Grimme","year":"2017","unstructured":"Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control? Big Data 5(4) (2017)","journal-title":"Big Data"},{"issue":"4","key":"7_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2746403","volume":"10","author":"Meng Jiang","year":"2016","unstructured":"Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Catching synchronized behaviors in large networks: a graph mining approach. ACM Trans. Knowl. Discov. From Data 10(4) (2016)","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"issue":"4","key":"7_CR23","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.giq.2012.06.002","volume":"29","author":"AL Kavanaugh","year":"2012","unstructured":"Kavanaugh, A.L., et al.: Social media use by government: from the routine to the critical. Gov. Inf. Q. 29(4), 480\u2013491 (2012)","journal-title":"Gov. Inf. Q."},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Ledig, C., et al.: Photo-realistic single image super-resolution using a generative adversarial network. In: IEEE ICCV (2017)","DOI":"10.1109\/CVPR.2017.19"},{"issue":"9","key":"7_CR25","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/3126492","volume":"60","author":"CA Lima Salge de","year":"2017","unstructured":"de Lima Salge, C.A., Berente, N.: Is that social bot behaving unethically? Commun. ACM 60(9), 29\u201331 (2017)","journal-title":"Commun. ACM"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Liu, S., Hooi, B., Faloutsos, C.: HoloScope: topology-and-spike aware fraud detection. In: ACM CIKM (2017)","DOI":"10.1145\/3132847.3133018"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Mazza, M., Cresci, S., Avvenuti, M., Quattrociocchi, W., Tesconi, M.: RTbust: exploiting temporal patterns for botnet detection on Twitter. In: ACM WebSci (2019)","DOI":"10.1145\/3292522.3326015"},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller, Z., Dickinson, B., Deitrick, W., Hu, W., Wang, A.H.: Twitter spammer detection using data stream clustering. Inf. Sci. 260, 64\u201373 (2014)","journal-title":"Inf. Sci."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Pandey, R., Castillo, C., Purohit, H.: Modeling human annotation errors to design bias-aware systems for social stream processing. In: IEEE\/ACM ASONAM (2019)","DOI":"10.1145\/3341161.3342931"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Pascual, S., Bonafonte, A., Serr\u00e0, J.: SEGAN: speech enhancement generative adversarial network. In: Interspeech (2017)","DOI":"10.21437\/Interspeech.2017-1428"},{"key":"7_CR31","unstructured":"Sahay, R., Mahfuz, R., Gamal, A.E.: A computationally efficient method for defending adversarial deep learning attacks. arXiv preprint arXiv:1906.05599 (2019)"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Shao, C., Ciampaglia, G.L., Varol, O., Yang, K.C., Flammini, A., Menczer, F.: The spread of low-credibility content by social bots. Nat. Commun. 9(1) (2018)","DOI":"10.1038\/s41467-018-06930-7"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Starbird, K., Arif, A., Wilson, T.: Disinformation as collaborative work: surfacing the participatory nature of strategic information operations. In: ACM CSCW (2019)","DOI":"10.1145\/3359229"},{"issue":"49","key":"7_CR34","doi-asserted-by":"publisher","first-page":"12435","DOI":"10.1073\/pnas.1803470115","volume":"115","author":"Massimo Stella","year":"2018","unstructured":"Stella, M., Ferrara, E., De\u00a0Domenico, M.: Bots increase exposure to negative and inflammatory content in online social systems. Proc. Nat. Acad. Sci. 115(49) (2018)","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C.A., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: AAAI ICWSM (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"issue":"8","key":"7_CR36","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving Twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"7_CR37","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1002\/hbe2.115","volume":"1","author":"KC Yang","year":"2019","unstructured":"Yang, K.C., Varol, O., Davis, C.A., Ferrara, E., Flammini, A., Menczer, F.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1(1), 48\u201361 (2019)","journal-title":"Hum. Behav. Emerg. Technol."},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Yardi, S., Romero, D., Schoenebeck, G., et\u00a0al.: Detecting spam in a Twitter network. First Monday 15(1) (2010)","DOI":"10.5210\/fm.v15i1.2793"}],"container-title":["Lecture Notes in Computer Science","Disinformation in Open Online Media"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39627-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T06:28:18Z","timestamp":1695709698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-39627-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030396268","9783030396275"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39627-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MISDOOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Multidisciplinary International Symposium on Disinformation in Open Online Media","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"misdoom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.misdoom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}