{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:25:32Z","timestamp":1743117932174,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030530358"},{"type":"electronic","value":"9783030530365"}],"license":[{"start":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:00:00Z","timestamp":1596758400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T00:00:00Z","timestamp":1596758400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-53036-5_31","type":"book-chapter","created":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T12:07:37Z","timestamp":1596715657000},"page":"284-294","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Feature Based Approach on Behavior Analysis of the Users on Twitter: A Case Study of AusOpen Tennis Championship"],"prefix":"10.1007","author":[{"given":"Niloufar","family":"Shoeibi","sequence":"first","affiliation":[]},{"given":"Alberto Mart\u00edn","family":"Mateos","sequence":"additional","affiliation":[]},{"given":"Alberto Rivas","family":"Camacho","sequence":"additional","affiliation":[]},{"given":"Juan M.","family":"Corchado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,7]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Waseem, Z., Hovy, D.: Hateful symbols or hateful people? Predictive features for hate speech detection on twitter. In: Proceedings of the NAACL Student Research Workshop, pp. 88\u201393, June 2016","key":"31_CR1","DOI":"10.18653\/v1\/N16-2013"},{"issue":"8","key":"31_CR2","doi-asserted-by":"publisher","first-page":"2216","DOI":"10.1109\/TKDE.2016.2556661","volume":"28","author":"W Xie","year":"2016","unstructured":"Xie, W., Zhu, F., Jiang, J., Lim, E.P., Wang, K.: TopicSketch: real-time bursty topic detection from twitter. IEEE Trans. Knowl. Data Eng. 28(8), 2216\u20132229 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"31_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.im.2016.03.004","volume":"54","author":"C Oh","year":"2017","unstructured":"Oh, C., Roumani, Y., Nwankpa, J.K., Hu, H.F.: Beyond likes and tweets: consumer engagement behavior and movie box office in social media. Inf. Manag. 54(1), 25\u201337 (2017)","journal-title":"Inf. Manag."},{"unstructured":"El, A., Azab, A.M.I., Mahmoud, M.A., Hefny, H.: Fake account detection in twitter based on minimum weighted feature set. World Acad. Sci. Eng. Technol. Int. J. Comput. Inf. Eng. 10(1) (2016)","key":"31_CR4"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.neucom.2016.06.045","volume":"214","author":"M Injadat","year":"2016","unstructured":"Injadat, M., Salo, F., Nassif, A.B.: Data mining techniques in social media: a survey. Neurocomputing 214, 654\u2013670 (2016)","journal-title":"Neurocomputing"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.trc.2016.12.008","volume":"75","author":"TH Rashidi","year":"2017","unstructured":"Rashidi, T.H., Abbasi, A., Maghrebi, M., Hasan, S., Waller, T.S.: Exploring the capacity of social media data for modelling travel behaviour: opportunities and challenges. Transp. Res. Part C: Emerg. Technol. 75, 197\u2013211 (2017)","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"issue":"6","key":"31_CR7","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2016.183","volume":"49","author":"VS Subrahmanian","year":"2016","unstructured":"Subrahmanian, V.S., Azaria, A., Durst, S., Kagan, V., Galstyan, A., Lerman, K., Menczer, F.: The DARPA Twitter bot challenge. Computer 49(6), 38\u201346 (2016)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Er\u015fahin, B., Akta\u015f, \u00d6., K\u0131l\u0131n\u00e7, D., Akyol, C.: Twitter fake account detection. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 388\u2013392. IEEE, October 2017","key":"31_CR8","DOI":"10.1109\/UBMK.2017.8093420"},{"doi-asserted-by":"crossref","unstructured":"Sundararaman, D., Srinivasan, S.: Twigraph: discovering and visualizing influential words between Twitter profiles. In: International Conference on Social Informatics, pp. 329\u2013346. Springer, Cham, September 2017","key":"31_CR9","DOI":"10.1007\/978-3-319-67256-4_26"},{"issue":"2","key":"31_CR10","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.jss.2016.06.050","volume":"206","author":"WC Crannell","year":"2016","unstructured":"Crannell, W.C., Clark, E., Jones, C., James, T.A., Moore, J.: A pattern-matched Twitter analysis of US cancer-patient sentiments. J. Surg. Res. 206(2), 536\u2013542 (2016)","journal-title":"J. Surg. Res."},{"doi-asserted-by":"crossref","unstructured":"Dai, X., Bikdash, M., Meyer, B.: From social media to public health surveillance: word embedding based clustering method for twitter classification. In: SoutheastCon 2017, pp. 1\u20137. IEEE, March 2017","key":"31_CR11","DOI":"10.1109\/SECON.2017.7925400"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.neucom.2015.02.081","volume":"172","author":"T Kaneko","year":"2016","unstructured":"Kaneko, T., Yanai, K.: Event photo mining from twitter using keyword bursts and image clustering. Neurocomputing 172, 143\u2013158 (2016)","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Perez, C., Germon, R.: Graph creation and analysis for linking actors: application to social data. In: Automating Open Source Intelligence, pp. 103\u2013129. Syngress (2016)","key":"31_CR13","DOI":"10.1016\/B978-0-12-802916-9.00007-5"},{"doi-asserted-by":"crossref","unstructured":"Deverashetti, M., Pradhan, S.K.: Identification of topologies by using harmonic centrality in huge social networks. In: 2018 3rd International Conference on Communication and Electronics Systems (ICCES), pp. 443\u2013448. IEEE, October 2018","key":"31_CR14","DOI":"10.1109\/CESYS.2018.8724042"},{"issue":"1","key":"31_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-018-07761-2","volume":"10","author":"A Bovet","year":"2019","unstructured":"Bovet, A., Makse, H.A.: Influence of fake news on Twitter during the 2016 US presidential election. Nat. Commun. 10(1), 1\u201314 (2019)","journal-title":"Nat. Commun."},{"doi-asserted-by":"crossref","unstructured":"Gurajala, S., White, J.S., Hudson, B., Matthews, J.N.: Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach. In: Proceedings of the 2015 International Conference on Social Media & Society, pp. 1\u20137, July 2015","key":"31_CR16","DOI":"10.1145\/2789187.2789206"}],"container-title":["Advances in Intelligent Systems and Computing","Distributed Computing and Artificial Intelligence, 17th International Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-53036-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T23:03:53Z","timestamp":1596755033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-53036-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,7]]},"ISBN":["9783030530358","9783030530365"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-53036-5_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,7]]},"assertion":[{"value":"7 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Distributed Computing and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00b4Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dcai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dcai-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}