{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:57:57Z","timestamp":1743026277022,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031534676"},{"type":"electronic","value":"9783031534683"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53468-3_21","type":"book-chapter","created":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T13:03:57Z","timestamp":1708347837000},"page":"250-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond Following: Augmenting Bot Detection with\u00a0the\u00a0Integration of\u00a0Behavioral Patterns"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Reiche","sequence":"first","affiliation":[]},{"given":"Sarel","family":"Cohen","sequence":"additional","affiliation":[]},{"given":"Kirill","family":"Simonov","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Friedrich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,20]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Cinelli, M., Cresci, S., Quattrociocchi, W., Tesconi, M., Zola, P.: Coordinated inauthentic behavior and information spreading on twitter. Decision Support Syst. 160, 113,819 (2022)","DOI":"10.1016\/j.dss.2022.113819"},{"issue":"10","key":"21_CR2","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/3409116","volume":"63","author":"S Cresci","year":"2020","unstructured":"Cresci, S.: A decade of social bot detection. Commun. ACM 63(10), 72\u201383 (2020)","journal-title":"Commun. ACM"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Cresci, S., Di\u00a0Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 963\u2013972 (2017)","DOI":"10.1145\/3041021.3055135"},{"issue":"2","key":"21_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3313184","volume":"13","author":"S Cresci","year":"2019","unstructured":"Cresci, S., Lillo, F., Regoli, D., Tardelli, S., Tesconi, M.: Cashtag piggybacking: uncovering spam and bot activity in stock microblogs on twitter. ACM Trans. Web (TWEB) 13(2), 1\u201327 (2019)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Elmas, T., Overdorf, R., Aberer, K.: Characterizing retweet bots: The case of black market accounts. In: Proceedings of the International AAAI Conference on Web and Social Media, vol.\u00a016, pp. 171\u2013182 (2022)","DOI":"10.1609\/icwsm.v16i1.19282"},{"key":"21_CR6","first-page":"35254","volume":"35","author":"S Feng","year":"2022","unstructured":"Feng, S., Tan, Z., Wan, H., Wang, N., Chen, Z., Zhang, B., Zheng, Q., Zhang, W., Lei, Z., Yang, S., et al.: Twibot-22: towards graph-based twitter bot detection. Adv. Neural. Inf. Process. Syst. 35, 35254\u201335269 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Feng, S., Wan, H., Wang, N., Luo, M.: Botrgcn: Twitter bot detection with relational graph convolutional networks. In: Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 236\u2013239 (2021)","DOI":"10.1145\/3487351.3488336"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Hays, C., Schutzman, Z., Raghavan, M., Walk, E., Zimmer, P.: Simplistic collection and labeling practices limit the utility of benchmark datasets for twitter bot detection. In: Proceedings of the ACM Web Conference 2023, pp. 3660\u20133669 (2023)","DOI":"10.1145\/3543507.3583214"},{"issue":"2","key":"21_CR9","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1080\/10584609.2019.1661888","volume":"37","author":"FB Keller","year":"2020","unstructured":"Keller, F.B., Schoch, D., Stier, S., Yang, J.: Political astroturfing on twitter: how to coordinate a disinformation campaign. Polit. Commun. 37(2), 256\u2013280 (2020)","journal-title":"Polit. Commun."},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Martini, F., Samula, P., Keller, T.R., Klinger, U.: Bot, or not? comparing three methods for detecting social bots in five political discourses. Big data & society 8(2), 20539517211033,566 (2021)","DOI":"10.1177\/20539517211033566"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Rauchfleisch, A., Kaiser, J.: The false positive problem of automatic bot detection in social science research. PloS one 15(10), e0241,045 (2020)","DOI":"10.1371\/journal.pone.0241045"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Vargas, L., Emami, P., Traynor, P.: On the detection of disinformation campaign activity with network analysis. In: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 133\u2013146 (2020)","DOI":"10.1145\/3411495.3421363"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C., Menczer, F., Flammini, A.: Online human-bot interactions: Detection, estimation, and characterization. In: Proceedings of the International AAAI Conference on Web and social media, vol.\u00a011, pp. 280\u2013289 (2017)","DOI":"10.1609\/icwsm.v11i1.14871"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53468-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T13:10:54Z","timestamp":1718629854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53468-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031534676","9783031534683"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53468-3_21","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"20 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Menton","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}