{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:40:43Z","timestamp":1761766843535,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630065"},{"type":"electronic","value":"9783030630072"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63007-2_6","type":"book-chapter","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:02:39Z","timestamp":1606089759000},"page":"71-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Method of Detecting Bots on Social Media. A Literature Review"],"prefix":"10.1007","author":[{"given":"Botambu","family":"Collins","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dinh Tuyen","family":"Hoang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dai Tho","family":"Dang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dosam","family":"Hwang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,11,23]]},"reference":[{"issue":"1","key":"6_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1002\/hbe2.115","volume":"1","author":"K Yang","year":"2019","unstructured":"Yang, K., Varol, O., Davis, C.A., Ferrara, E., Flammini, A., Menczer, F.: Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 1(1), 48\u201361 (2019). https:\/\/doi.org\/10.1002\/hbe2.115","journal-title":"Hum. Behav. Emerg. Technol."},{"unstructured":"Karata\u015f, A., \u015eahin, S.: A Review on social bot detection techniques and research directions. In: Proceedings of the International Information Security and Cryptology Conference, Turkey, no. i, pp. 156\u2013161 (2017)","key":"6_CR2"},{"issue":"2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/SURV.2013.091213.00134","volume":"16","author":"S Khattak","year":"2014","unstructured":"Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutorials 16(2), 898\u2013924 (2014). https:\/\/doi.org\/10.1109\/SURV.2013.091213.00134","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1089\/big.2017.0044","volume":"5","author":"C Grimme","year":"2017","unstructured":"Grimme, C., Preuss, M., Adam, L., Trautmann, H.: Social bots: human-like by means of human control? Big Data 5(4), 279\u2013293 (2017). https:\/\/doi.org\/10.1089\/big.2017.0044","journal-title":"Big Data"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ins.2018.08.019","volume":"467","author":"S Kudugunta","year":"2018","unstructured":"Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. (Ny) 467, 312\u2013322 (2018). https:\/\/doi.org\/10.1016\/j.ins.2018.08.019","journal-title":"Inf. Sci. (Ny)"},{"doi-asserted-by":"publisher","unstructured":"Perez-Soler, S., Guerra, E., De Lara, J., Jurado, F.: The rise of the (modelling) bots: towards assisted modelling via social networks. In: ASE 2017 \u2013 Proceedings of the 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 723\u2013728 (2017). https:\/\/doi.org\/10.1109\/ase.2017.8115683","key":"6_CR6","DOI":"10.1109\/ase.2017.8115683"},{"issue":"7","key":"6_CR7","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016). https:\/\/doi.org\/10.1145\/2818717","journal-title":"Commun. ACM"},{"doi-asserted-by":"publisher","unstructured":"Yang, K.C., Hui, P.M., Menczer, F.: Bot electioneering volume: visualizing social bot activity during elections. In: Web Conference 2019 - Companion World Wide Web Conference WWW 2019, pp. 214\u2013217 (2019). https:\/\/doi.org\/10.1145\/3308560.3316499","key":"6_CR8","DOI":"10.1145\/3308560.3316499"},{"doi-asserted-by":"crossref","unstructured":"Ratkiewicz, J., Meiss, M., Conover, M., Gon\u00e7alves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, p. 297 (2011)","key":"6_CR9","DOI":"10.1609\/icwsm.v5i1.14127"},{"issue":"10","key":"6_CR10","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.2105\/AJPH.2018.304567","volume":"108","author":"DA Broniatowski","year":"2018","unstructured":"Broniatowski, D.A., et al.: Weaponized health communication: Twitter bots and Russian trolls amplify the vaccine debate. Am. J. Public Health 108(10), 1378\u20131384 (2018). https:\/\/doi.org\/10.2105\/AJPH.2018.304567","journal-title":"Am. J. Public Health"},{"doi-asserted-by":"publisher","unstructured":"Mehrotra, A., Sarreddy, M., Singh, S.: Detection of fake Twitter followers using graph centrality measures. In: Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics, IC3I 2016, September 2016, pp. 499\u2013504 (2016). https:\/\/doi.org\/10.1109\/ic3i.2016.7918016","key":"6_CR11","DOI":"10.1109\/ic3i.2016.7918016"},{"doi-asserted-by":"publisher","unstructured":"Barbon, S., et al.: Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets. ACM Trans. Multimed. Comput. Commun. Appl. 14(1s) (2018). https:\/\/doi.org\/10.1145\/3183506","key":"6_CR12","DOI":"10.1145\/3183506"},{"doi-asserted-by":"publisher","unstructured":"Kaubiyal, J., Jain, A.K.: A feature based approach to detect fake profiles in Twitter. In: ACM International Conference Proceeding Series, pp. 135\u2013139 (2019). https:\/\/doi.org\/10.1145\/3361758.3361784","key":"6_CR13","DOI":"10.1145\/3361758.3361784"},{"doi-asserted-by":"publisher","unstructured":"Luo, L., Zhang, X., Yang, X., Yang, W.: Deepbot: a deep neural network based approach for detecting Twitter Bots. IOP Conf. Ser. Mater. Sci. Eng. 719(1) (2020). https:\/\/doi.org\/10.1088\/1757-899x\/719\/1\/012063","key":"6_CR14","DOI":"10.1088\/1757-899x\/719\/1\/012063"},{"key":"6_CR15","series-title":"Computational Social Sciences","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-77332-2_13","volume-title":"Complex Spreading Phenomena in Social Systems","author":"E Ferrara","year":"2018","unstructured":"Ferrara, E.: Measuring social spam and the effect of bots on information diffusion in social media. In: Lehmann, S., Ahn, Y.-Y. (eds.) Complex Spreading Phenomena in Social Systems. CSS, pp. 229\u2013255. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-77332-2_13. arXiv: 1708.08134v1"},{"issue":"4","key":"6_CR16","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","volume":"16","author":"M Fire","year":"2014","unstructured":"Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019\u20132036 (2014). https:\/\/doi.org\/10.1109\/COMST.2014.2321628","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.procs.2016.02.080","volume":"78","author":"AM Bhise","year":"2016","unstructured":"Bhise, A.M., Kamble, S.D.: Review on detection and mitigation of Sybil attack in the network. Phys. Procedia Comput. Sci. 78, 395\u2013401 (2016). https:\/\/doi.org\/10.1016\/j.procs.2016.02.080","journal-title":"Phys. Procedia Comput. Sci."},{"doi-asserted-by":"publisher","unstructured":"Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network Sybils in the wild. ACM Trans. Knowl. Discov. Data 8(1) (2014). https:\/\/doi.org\/10.1145\/2556609","key":"6_CR18","DOI":"10.1145\/2556609"},{"unstructured":"Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: NSDI 2012 Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, p. 15 (2012)","key":"6_CR19"},{"doi-asserted-by":"publisher","unstructured":"Lieto, A., et al.: Hello? Who am I talking to? A shallow CNN approach for human vs. bot speech classification. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, May 2019, pp. 2577\u20132581 (2019). https:\/\/doi.org\/10.1109\/icassp.2019.8682743","key":"6_CR20","DOI":"10.1109\/icassp.2019.8682743"},{"unstructured":"Melmeti, K., Shannon, C., Asaf, V.: Visualization of the social bot\u2019s fingerprints. In: 4th International Symposium on Digital Forensics and Security, pp. 161\u2013166 (2016)","key":"6_CR21"},{"doi-asserted-by":"publisher","unstructured":"Stein, T., Chen, E., Mangla, K.: Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, SNS 2011 (2011). https:\/\/doi.org\/10.1145\/1989656.1989664","key":"6_CR22","DOI":"10.1145\/1989656.1989664"},{"unstructured":"Paul, A., Sinha, S., Pal, S.: An efficient method to detect Sybil attack using trust based model. In: Proceedings of the International Conference on Advances in Computer Science AETACS, December 2013, pp. 228\u2013237 (2013)","key":"6_CR23"},{"unstructured":"Glasgow, J.: Swarm intelligence: concepts, models and applications. Technical report 2012-585 (2012)","key":"6_CR24"},{"key":"6_CR25","volume-title":"The Wisdom of Crowds, First Anch","author":"J Surowiecki","year":"2004","unstructured":"Surowiecki, J.: The Wisdom of Crowds, First Anch. Anchor Books, A Division of Random House Inc, New York (2004)"},{"issue":"2","key":"6_CR26","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1080\/01969722.2019.1565117","volume":"50","author":"DT Dang","year":"2019","unstructured":"Dang, D.T., Nguyen, N.T., Hwang, D.: Multi-step consensus: an effective approach for determining consensus in large collectives. Cybern. Syst. 50(2), 208\u2013229 (2019). https:\/\/doi.org\/10.1080\/01969722.2019.1565117","journal-title":"Cybern. Syst."},{"key":"6_CR27","volume-title":"Collective Intelligence: Creating a Prosperous World at Peace","author":"T Malone","year":"2008","unstructured":"Malone, T., Atlee, T., L\u00e9vy, P., Rt, T., Paul, H., Homer-dixon, T.: Collective Intelligence: Creating a Prosperous World at Peace. Earth Intelligence Network, Oakton (2008)"},{"unstructured":"Wang, G., et al.: Social turing tests: crowdsourcing Sybil detection (2012)","key":"6_CR28"},{"doi-asserted-by":"crossref","unstructured":"Schnebly, J., Sengupta, S.: Random forest Twitter bot classifier. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference CCWC 2019, pp. 506\u2013512 (2019). http:\/\/doi.org\/10.1109\/CCWC.2019.8666593","key":"6_CR29","DOI":"10.1109\/CCWC.2019.8666593"},{"unstructured":"Danezis, G.: SybilInfer: detecting Sybil nodes using social networks. In: Network and Distributed System Security Symposium (2009)","key":"6_CR30"},{"issue":"3","key":"6_CR31","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/TNET.2009.2034047","volume":"18","author":"H Yu","year":"2010","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against Sybil attacks. IEEE\/ACM Trans. Netw. 18(3), 885\u2013898 (2010). https:\/\/doi.org\/10.1109\/TNET.2009.2034047","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"6_CR32","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/1159913.1159945","volume":"16","author":"H Yu","year":"2008","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against Sybil attacks via social networks. IEEE\/ACM Trans. Netw. 16(3), 267 (2008). https:\/\/doi.org\/10.1145\/1159913.1159945","journal-title":"IEEE\/ACM Trans. Netw."},{"doi-asserted-by":"publisher","unstructured":"Gang, W., Tristan, K., Christo, W., Haitao, Z., Zhao, B.Y.: You are how you click: clickstream analysis for Sybil detection. In: Proceedings of the 22nd USENIX Security Symposium, vol. 7, no. 2, pp. 95\u2013112 (2013). https:\/\/doi.org\/10.1111\/j.1745-4522.2000.tb00164.x","key":"6_CR33","DOI":"10.1111\/j.1745-4522.2000.tb00164.x"},{"key":"6_CR34","series-title":"Advanced Information and Knowledge Processing","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-889-0","volume-title":"Advanced Methods for Inconsistent Knowledge Management","author":"NT Nguyen","year":"2008","unstructured":"Nguyen, N.T.: Advanced Methods for Inconsistent Knowledge Management. AIKP. Springer, London (2008). https:\/\/doi.org\/10.1007\/978-1-84628-889-0"},{"doi-asserted-by":"crossref","unstructured":"Danilowicz, C., Nguyen, N.T.: Consensus-based methods for restoring consistency of replicated data. In: K\u2019opotek et al. (eds.) Advances in Soft Computing, Proceedings of 9th International Conference on Intelligent Information Systems 2000, pp. 325\u2013336. Physica (2000)","key":"6_CR35","DOI":"10.1007\/978-3-7908-1846-8_29"},{"key":"6_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/3-540-44411-4_30","volume-title":"SOFSEM 2000: Theory and Practice of Informatics","author":"NT Nguyen","year":"2000","unstructured":"Nguyen, N.T.: Using consensus methods for solving conflicts of data in distributed systems. In: Hlav\u00e1\u010d, V., Jeffery, K.G., Wiedermann, J. (eds.) SOFSEM 2000. LNCS, vol. 1963, pp. 411\u2013419. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44411-4_30"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63007-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T07:24:51Z","timestamp":1669706691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63007-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630065","9783030630072"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63007-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Da Nang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}