{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:21:29Z","timestamp":1743081689485,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587987"},{"type":"electronic","value":"9783030587994"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58799-4_42","type":"book-chapter","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T13:06:26Z","timestamp":1601471186000},"page":"572-585","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Evaluation of Low-Quality Content Detection Strategies: Which Attributes Are Still Relevant, Which Are Not?"],"prefix":"10.1007","author":[{"given":"J\u00falio","family":"Resende","sequence":"first","affiliation":[]},{"given":"Vinicius H. S.","family":"Durelli","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Moraes","sequence":"additional","affiliation":[]},{"given":"N\u00edcollas","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Diego R. C.","family":"Dias","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Rocha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,1]]},"reference":[{"key":"42_CR1","doi-asserted-by":"publisher","unstructured":"Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: PhishAri: automatic realtime phishing detection on twitter. In: 2012 eCrime Researchers Summit. IEEE, October 2012. https:\/\/doi.org\/10.1109\/ecrime.2012.6489521","DOI":"10.1109\/ecrime.2012.6489521"},{"key":"42_CR2","doi-asserted-by":"publisher","unstructured":"Almaatouq, A., et al.: Twitter: who gets caught? Observed trends in social micro-blogging spam. In: Proceedings of the 2014 ACM conference on Web science - WebSci. ACM Press (2014). https:\/\/doi.org\/10.1145\/2615569.2615688","DOI":"10.1145\/2615569.2615688"},{"key":"42_CR3","doi-asserted-by":"publisher","unstructured":"Azeta, A.A., Omoregbe, N.A., Ayo, C.K., Raymond, A., Oroge, A., Misra, S.: An anti-cultism social education media system. In: 2014 Global Summit on Computer & Information Technology (GSCIT). IEEE, June 2014. https:\/\/doi.org\/10.1109\/gscit.2014.6970097","DOI":"10.1109\/gscit.2014.6970097"},{"issue":"11","key":"42_CR4","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.3390\/app7111173","volume":"7","author":"R Behera","year":"2017","unstructured":"Behera, R., Rath, S., Misra, S., Dama\u0161evi\u010dius, R., Maskeli\u016bnas, R.: Large scale community detection using a small world model. Appl. Sci. 7(11), 1173 (2017). https:\/\/doi.org\/10.3390\/app7111173","journal-title":"Appl. Sci."},{"issue":"8","key":"42_CR5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.3390\/a12080161","volume":"12","author":"RK Behera","year":"2019","unstructured":"Behera, R.K., Rath, S.K., Misra, S., Dama\u0161evi\u010dius, R., Maskeli\u016bnas, R.: Distributed centrality analysis of social network data using MapReduce. Algorithms 12(8), 161 (2019). https:\/\/doi.org\/10.3390\/a12080161","journal-title":"Algorithms"},{"key":"42_CR6","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)"},{"key":"42_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-642-28997-2_31","volume-title":"Advances in Information Retrieval","author":"M Bosma","year":"2012","unstructured":"Bosma, M., Meij, E., Weerkamp, W.: A framework for unsupervised spam detection in social networking sites. In: Baeza-Yates, R., et al. (eds.) ECIR 2012. LNCS, vol. 7224, pp. 364\u2013375. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28997-2_31"},{"issue":"8","key":"42_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0182487","volume":"12","author":"W Chen","year":"2017","unstructured":"Chen, W., Yeo, C.K., Lau, C.T., Lee, B.S.: A study on real-time low-quality content detection on Twitter from the users\u2019 perspective. PLOS One 12(8), 1\u201322 (2017). https:\/\/doi.org\/10.1371\/journal.pone.0182487","journal-title":"PLOS One"},{"key":"42_CR9","doi-asserted-by":"publisher","unstructured":"Fakhraei, S., Foulds, J., Shashanka, M., Getoor, L.: Collective spammer detection in evolving multi-relational social networks. In: Proceedings of the 21th SIGKDD. ACM Press (2015). https:\/\/doi.org\/10.1145\/2783258.2788606","DOI":"10.1145\/2783258.2788606"},{"key":"42_CR10","doi-asserted-by":"publisher","unstructured":"Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.: Poster. In: Proceedings of the 18th ACM conference on Computer and communications security. ACM Press (2011). https:\/\/doi.org\/10.1145\/2046707.2093489","DOI":"10.1145\/2046707.2093489"},{"key":"42_CR11","doi-asserted-by":"publisher","unstructured":"Hu, X., Tang, J., Gao, H., Liu, H.: Social spammer detection with sentiment information. In: 2014 IEEE International Conference on Data Mining. IEEE, December 2014. https:\/\/doi.org\/10.1109\/icdm.2014.141","DOI":"10.1109\/icdm.2014.141"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Jin, X., Lin, C.X., Luo, J., Han, J.: Socialspamguard: a data mining-based spam detection system for social media networks. In: Proceedings of the International Conference on Very Large Data Bases (2011)","DOI":"10.14778\/3402755.3402795"},{"key":"42_CR13","unstructured":"Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on Twitter. In: Fifth International AAAI Conference on Weblogs and Social Media (2011)"},{"key":"42_CR14","doi-asserted-by":"publisher","unstructured":"Liu, H., Setiono, R.: Chi2: feature selection and discretization of numeric attributes. In: Proceedings of 7th IEEE International Conference on Tools with Artificial Intelligence. IEEE Computer Society Press (1995). https:\/\/doi.org\/10.1109\/tai.1995.479783","DOI":"10.1109\/tai.1995.479783"},{"issue":"8","key":"42_CR15","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992\u20133000 (2013). https:\/\/doi.org\/10.1016\/j.eswa.2012.12.015","journal-title":"Expert Syst. Appl."},{"key":"42_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-23496-5_13","volume-title":"Autonomic and Trusted Computing","author":"M McCord","year":"2011","unstructured":"McCord, M., Chuah, M.: Spam detection on Twitter using traditional classifiers. In: Calero, J.M.A., Yang, L.T., M\u00e1rmol, F.G., Garc\u00eda Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 175\u2013186. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23496-5_13"},{"key":"42_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller, Z., Dickinson, B., Deitrick, W., Hu, W., Wang, A.H.: Twitter spammer detection using data stream clustering. Inf. Sci. 260, 64\u201373 (2014). https:\/\/doi.org\/10.1016\/j.ins.2013.11.016","journal-title":"Inf. Sci."},{"key":"42_CR18","doi-asserted-by":"publisher","unstructured":"Santos, I., et al.: Twitter content-based spam filtering. In: Herrero, \u00c1., et al. (eds.) International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913. AISC, vol. 239, pp. 449\u2013458. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-01854-6_46","DOI":"10.1007\/978-3-319-01854-6_46"},{"key":"42_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","volume-title":"Recent Advances in Intrusion Detection","author":"J Song","year":"2011","unstructured":"Song, J., Lee, S., Kim, J.: Spam filtering in Twitter using sender-receiver relationship. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 301\u2013317. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_16"},{"key":"42_CR20","doi-asserted-by":"publisher","unstructured":"Sridharan, V., Shankar, V., Gupta, M.: Twitter games. In: Proceedings of the 28th ACSAC. ACM Press (2012). https:\/\/doi.org\/10.1145\/2420950.2421007","DOI":"10.1145\/2420950.2421007"},{"key":"42_CR21","doi-asserted-by":"publisher","unstructured":"Tan, E., Guo, L., Chen, S., Zhang, X., Zhao, Y.: Spammer behavior analysis and detection in user generated content on social networks. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems. IEEE, June 2012. https:\/\/doi.org\/10.1109\/icdcs.2012.40","DOI":"10.1109\/icdcs.2012.40"},{"key":"42_CR22","doi-asserted-by":"publisher","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. ACM Press (2011). https:\/\/doi.org\/10.1145\/2068816.2068840","DOI":"10.1145\/2068816.2068840"},{"key":"42_CR23","unstructured":"Ungerleider, N.: Almost 10% of Twitter is spam (2015). https:\/\/www.fastcompany.com\/3044485\/almost-10-of-twitter-is-spam. Accessed 02 July 2019"},{"key":"42_CR24","unstructured":"Wang, A.H.: Don\u2019t follow me: spam detection in twitter. In: 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1\u201310, July 2010"},{"key":"42_CR25","unstructured":"Wang, B., Zubiaga, A., Liakata, M., Procter, R.: Making the most of tweet-inherent features for social spam detection on Twitter. arXiv preprint arXiv:1503.07405 (2015)"},{"issue":"8","key":"42_CR26","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/tifs.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013). https:\/\/doi.org\/10.1109\/tifs.2013.2267732","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"42_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"C Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318\u2013337. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_17"},{"issue":"8","key":"42_CR28","doi-asserted-by":"publisher","first-page":"2991","DOI":"10.1007\/s11227-015-1437-5","volume":"72","author":"X Zheng","year":"2015","unstructured":"Zheng, X., Zhang, X., Yu, Y., Kechadi, T., Rong, C.: ELM-based spammer detection in social networks. J. Supercomput. 72(8), 2991\u20133005 (2015). https:\/\/doi.org\/10.1007\/s11227-015-1437-5","journal-title":"J. Supercomput."},{"key":"42_CR29","unstructured":"\u0141uksza, K.: Bot traffic is bigger than human. make sure it doesn\u2019t affect you! (2018). https:\/\/voluum.com\/blog\/bot-traffic-bigger-than-human-make-sure-they-dont-affect-you\/"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58799-4_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T16:14:55Z","timestamp":1619194495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58799-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030587987","9783030587994"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58799-4_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}