{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:16:13Z","timestamp":1742966173888,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030440404"},{"type":"electronic","value":"9783030440411"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44041-1_87","type":"book-chapter","created":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T19:02:51Z","timestamp":1585335771000},"page":"1007-1019","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficiently Detecting Web Spambots in a Temporally Annotated Sequence"],"prefix":"10.1007","author":[{"given":"Hayam","family":"Alamro","sequence":"first","affiliation":[]},{"given":"Costas S.","family":"Iliopoulos","sequence":"additional","affiliation":[]},{"given":"Grigorios","family":"Loukides","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,28]]},"reference":[{"key":"87_CR1","doi-asserted-by":"crossref","unstructured":"Yan, J., El\u00a0Ahmad, A.S.: A low-cost attack on a Microsoft captcha. In: CCS. ACM, pp. 543\u2013554 (2008)","DOI":"10.1145\/1455770.1455839"},{"key":"87_CR2","unstructured":"Zinman, A., Donath, J.S.: Is britney spears spam? In: CEAS (2007)"},{"key":"87_CR3","unstructured":"Webb, S., Caverlee, J., Pu, C.: Social honeypots: making friends with a spammer near you. In: CEAS, pp. 1\u201310 (2008)"},{"issue":"6","key":"87_CR4","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11(6), 36\u201345 (2007)","journal-title":"IEEE Internet Comput."},{"key":"87_CR5","doi-asserted-by":"crossref","unstructured":"Hayati, P., Chai, K., Potdar, V., Talevski, A.: Behaviour-based web spambot detection by utilising action time and action frequency. In: International Conference on Computational Science and Its Applications, pp. 351\u2013360 (2010)","DOI":"10.1007\/978-3-642-12165-4_28"},{"key":"87_CR6","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K.: Identifying video spammers in online social networks. In: International workshop on Adversarial Information Retrieval on the Web, pp. 45\u201352. ACM (2008)","DOI":"10.1145\/1451983.1451996"},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Wang, A.H.: Detecting spam bots in online social networking sites: a machine learning approach. In: CODASPY, pp. 335\u2013342 (2010)","DOI":"10.1007\/978-3-642-13739-6_25"},{"key":"87_CR8","unstructured":"Hayati, P., Potdar, V., Talevski, A., Smyth, W.: Rule-based on-the-fly web spambot detection using action strings. In: CEAS (2010)"},{"key":"87_CR9","doi-asserted-by":"crossref","unstructured":"Ghanaei, V., Iliopoulos, C.S., Pissis, S.P.: Detection of web spambot in the presence of decoy actions. In: IEEE International Conference on Big Data and Cloud Computing, pp. 277\u2013279 (2014)","DOI":"10.1109\/BDCloud.2014.134"},{"key":"87_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.ipl.2016.10.003","volume":"118","author":"M Nicolae","year":"2017","unstructured":"Nicolae, M., Rajasekaran, S.: On pattern matching with k mismatches and few don\u2019t cares. IPL 118, 78\u201382 (2017)","journal-title":"IPL"},{"issue":"1\u20132","key":"87_CR11","first-page":"1545","volume":"3","author":"D Wang","year":"2010","unstructured":"Wang, D., Rundensteiner, E.A., Wang, H., Ellison III, R.T.: Active complex event processing: applications in real-time health care. PVLDB 3(1\u20132), 1545\u20131548 (2010)","journal-title":"PVLDB"},{"key":"87_CR12","doi-asserted-by":"crossref","unstructured":"Wang, D., He, Y., Rundensteiner, E., Naughton, J.F.: Utility-maximizing event stream suppression. In: SIGMOD, pp. 589\u2013600 (2013)","DOI":"10.1145\/2463676.2465305"},{"key":"87_CR13","first-page":"2068","volume":"61","author":"SJ Harvey","year":"2013","unstructured":"Harvey, S.J.: Smart meters, smarter regulation: balancing privacy and innovation in the electric grid. UCLA L. Rev. 61, 2068 (2013)","journal-title":"UCLA L. Rev."},{"key":"87_CR14","doi-asserted-by":"crossref","unstructured":"Aljamea, M.M., Brankovic, L., Gao, J., Iliopoulos, C.S., Samiruzzaman, M.: Smart meter data analysis. In: Proceedings of the International Conference on Internet of Things and Cloud Computing, p.\u00a022 (2016)","DOI":"10.1145\/2896387.2896407"},{"key":"87_CR15","unstructured":"Alamro, H., Badkobeh, G., Belazzougui, D., Iliopoulos, C.S., Puglisi, S.J.: Computing the antiperiod(s) of a string. In: CPM, pp. 32:1\u201332:11 (2019)"},{"key":"87_CR16","doi-asserted-by":"crossref","unstructured":"Kasai, T., Lee, G., Arimura, H., Arikawa, S., Park, K.: Linear-time longest-common-prefix computation in suffix arrays and its applications. In: CPM, pp. 181\u2013192 (2001)","DOI":"10.1007\/3-540-48194-X_17"},{"key":"87_CR17","doi-asserted-by":"crossref","unstructured":"Puglisi, S.J., Smyth, W.F., Turpin, A.H.: A taxonomy of suffix array construction algorithms. ACM Comput. Surv. 39(2), 4\u2013es (2007)","DOI":"10.1145\/1242471.1242472"},{"issue":"1","key":"87_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/089120101300346787","volume":"27","author":"M Yamamoto","year":"2001","unstructured":"Yamamoto, M., Church, K.W.: Using suffix arrays to compute term frequency and document frequency for all substrings in a corpus. Comput. Linguist. 27(1), 1\u201330 (2001)","journal-title":"Comput. Linguist."},{"issue":"6","key":"87_CR19","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1145\/1217856.1217858","volume":"53","author":"J K\u00e4rkk\u00e4inen","year":"2006","unstructured":"K\u00e4rkk\u00e4inen, J., Sanders, P., Burkhardt, S.: Linear work suffix array construction. JACM 53(6), 918\u2013936 (2006)","journal-title":"JACM"},{"key":"87_CR20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/S1570-8667(03)00065-0","volume":"2","author":"MI Abouelhoda","year":"2004","unstructured":"Abouelhoda, M.I., Kurtz, S., Ohlebusch, E.: Replacing suffix trees with enhanced suffix arrays. J. Discrete Algorithms 2, 53\u201386 (2004)","journal-title":"J. Discrete Algorithms"},{"key":"87_CR21","doi-asserted-by":"crossref","unstructured":"Abouelhoda, M.I., Kurtz, S., Ohlebusch, E.: Enhanced suffix arrays and applications. CRC Press (2006)","DOI":"10.1201\/9781420036275.ch7"},{"issue":"1","key":"87_CR22","first-page":"26","volume":"12","author":"FA Louza","year":"2017","unstructured":"Louza, F.A., Telles, G.P., Hoffmann, S., Ciferri, C.D.: Generalized enhanced suffix array construction in external memory. AMB 12(1), 26 (2017)","journal-title":"AMB"},{"key":"87_CR23","doi-asserted-by":"crossref","unstructured":"Nong, G., Zhang, S., Chan, W.H.: Linear suffix array construction by almost pure induced-sorting. In: DCC, pp. 193\u2013202 (2009)","DOI":"10.1109\/DCC.2009.42"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44041-1_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,28]],"date-time":"2020-03-28T00:22:55Z","timestamp":1585354975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44041-1_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030440404","9783030440411"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44041-1_87","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caserta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0d","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}