{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:12:48Z","timestamp":1743124368744,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031702471"},{"type":"electronic","value":"9783031702488"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70248-8_30","type":"book-chapter","created":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:02:25Z","timestamp":1725685345000},"page":"384-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Strategies to\u00a0Use Harvesters in\u00a0Trustworthy Fake News Detection Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5955-5890","authenticated-orcid":false,"given":"Krzysztof","family":"Cabaj","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0014-1204","authenticated-orcid":false,"given":"Marcin","family":"Kowalczyk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1108-2780","authenticated-orcid":false,"given":"Marcin","family":"Gregorczyk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1405-9911","authenticated-orcid":false,"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-3306","authenticated-orcid":false,"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8509-4127","authenticated-orcid":false,"given":"Wojciech","family":"Mazurczyk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,8]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","unstructured":"Aghamohammadi, A., Eydgahi, A.: A novel defense mechanism against web crawlers intrusion. In: 2013 International Conference on Electronics, Computer and Computation (ICECCO), pp. 269\u2013272 (2013). https:\/\/doi.org\/10.1109\/ICECCO.2013.6718280","DOI":"10.1109\/ICECCO.2013.6718280"},{"key":"30_CR2","doi-asserted-by":"publisher","unstructured":"Bogonikolos, N., Fragoudis, D., Likothanassis, S.: \"archimides\": an intelligent agent for adaptive-personalized navigation within a web server. In: Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers. vol. Track5, pp. 9 pp.\u2013 (1999). https:\/\/doi.org\/10.1109\/HICSS.1999.772923","DOI":"10.1109\/HICSS.1999.772923"},{"key":"30_CR3","doi-asserted-by":"publisher","unstructured":"Bradford, C., Marshall, I.: A bandwidth friendly search engine. In: Proceedings IEEE International Conference on Multimedia Computing and Systems, vol.\u00a02, pp. 720\u2013724 (1999)https:\/\/doi.org\/10.1109\/MMCS.1999.778573","DOI":"10.1109\/MMCS.1999.778573"},{"key":"30_CR4","doi-asserted-by":"publisher","unstructured":"Cohen, A., Nissim, N., Elovici, Y.: Maljpeg: Machine learning based solution for the detection of malicious jpeg images. IEEE Access 8, 19997\u201320011 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2969022","DOI":"10.1109\/ACCESS.2020.2969022"},{"key":"30_CR5","doi-asserted-by":"publisher","unstructured":"Diouf, R., Sarr, E.N., Sall, O., Birregah, B., Bousso, M., Mbaye, S.N.: Web scraping: State-of-the-art and areas of application. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 6040\u20136042 (2019). https:\/\/doi.org\/10.1109\/BigData47090.2019.9005594","DOI":"10.1109\/BigData47090.2019.9005594"},{"key":"30_CR6","doi-asserted-by":"publisher","unstructured":"Kim, B., Xiong, A., Lee, D., Han, K.: A systematic review on fake news research through the lens of news creation and consumption: research efforts, challenges, and future directions. PLOS ONE 16(12), 1\u201328 (2021). https:\/\/doi.org\/10.1371\/journal.pone.0260080","DOI":"10.1371\/journal.pone.0260080"},{"key":"30_CR7","doi-asserted-by":"publisher","unstructured":"Kowalczyk, M., Malanowska, A., Mazurczyk, W., Cabaj, K.: Web page harvesting for automatized large-scale digital images anomaly detection. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3538969.3544471","DOI":"10.1145\/3538969.3544471"},{"key":"30_CR8","doi-asserted-by":"publisher","unstructured":"Kozik, R., Komorniczak, J., Ksieniewicz, P., Pawlicka, A., Pawlicki, M., Chora\u015b, M.: Swarog project approach to fake news detection problem. In: Garc\u00eda\u00a0Bringas, P., et al. (eds.) International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), pp. 79\u201388. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-42519-6_8","DOI":"10.1007\/978-3-031-42519-6_8"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-030-33617-2_34","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2019","author":"P Ksieniewicz","year":"2019","unstructured":"Ksieniewicz, P., Chora\u015b, M., Kozik, R., Wo\u017aniak, M.: Machine learning methods for fake news classification. In: Yin, H., Camacho, D., Tino, P., Tall\u00f3n-Ballesteros, A.J., Menezes, R., Allmendinger, R. (eds.) IDEAL 2019. LNCS, vol. 11872, pp. 332\u2013339. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33617-2_34"},{"key":"30_CR10","doi-asserted-by":"publisher","unstructured":"Ksieniewicz, P., Zyblewski, P., Chora\u015b, M., Kozik, R., Gie\u0142czyk, A., Wo\u017aniak, M.: Fake news detection from data streams. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138 (2020).https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9207498","DOI":"10.1109\/IJCNN48605.2020.9207498"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/978-3-030-50423-6_49","volume-title":"Computational Science \u2013 ICCS 2020","author":"S Kula","year":"2020","unstructured":"Kula, S., Chora\u015b, M., Kozik, R., Ksieniewicz, P., Wo\u017aniak, M.: Sentiment analysis for fake news detection by means of neural networks. In: Krzhizhanovskaya, V.V., et al. (eds.) ICCS 2020. LNCS, vol. 12140, pp. 653\u2013666. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50423-6_49"},{"issue":"6","key":"30_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1218","volume":"7","author":"M Kumar","year":"2017","unstructured":"Kumar, M., Bhatia, R., Rattan, D.: A survey of web crawlers for information retrieval. WIREs Data Min. Knowl. Discovery 7(6), e1218 (2017). https:\/\/doi.org\/10.1002\/widm.1218","journal-title":"WIREs Data Min. Knowl. Discovery"},{"key":"30_CR13","doi-asserted-by":"publisher","unstructured":"Kunwar, R.S., Sharma, P.: Framework to detect malicious codes embedded with jpeg images over social networking sites. In: 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp.\u00a01\u20134 (2017)https:\/\/doi.org\/10.1109\/ICIIECS.2017.8276144","DOI":"10.1109\/ICIIECS.2017.8276144"},{"key":"30_CR14","doi-asserted-by":"publisher","unstructured":"Mazurczyk, W., Lee, D., Vlachos, A.: Disinformation 2.0 in the age of ai: a cybersecurity perspective. Commun. ACM 67(3), 36-39 (2024).https:\/\/doi.org\/10.1145\/3624721","DOI":"10.1145\/3624721"},{"key":"30_CR15","doi-asserted-by":"publisher","unstructured":"Meg\u00edas, D., Kuribayashi, M., Rosales, A., Cabaj, K., Mazurczyk, W.: Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appli. 13(1), 33\u201355 (2022). https:\/\/doi.org\/10.22667\/JOWUA.2022.03.31.033","DOI":"10.22667\/JOWUA.2022.03.31.033"},{"key":"30_CR16","doi-asserted-by":"publisher","unstructured":"Narkar, N.G., Shekokar, N.M.: A rule based intrusion detection system to identify vindictive web spider. In: 2016 International Conference on Computing, Analytics and Security Trends (CAST). pp. 271\u2013275 (2016).https:\/\/doi.org\/10.1109\/CAST.2016.7914979","DOI":"10.1109\/CAST.2016.7914979"},{"key":"30_CR17","doi-asserted-by":"publisher","unstructured":"Rahayuda, I.G.S., Santiari, N.P.L.: Web harvesting for data retrieval on scientific journal sites. Jurnal Informatika Universitas Pamulang 6(1), 202\u2013209 (2021). https:\/\/doi.org\/10.32493\/informatika.v6i1.10077","DOI":"10.32493\/informatika.v6i1.10077"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"61726","DOI":"10.1109\/ACCESS.2020.2984503","volume":"8","author":"E Uzun","year":"2020","unstructured":"Uzun, E.: A novel web scraping approach using the additional information obtained from web pages. IEEE Access 8, 61726\u201361740 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2984503","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Advances in Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70248-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:14:16Z","timestamp":1725686056000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70248-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031702471","9783031702488"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70248-8_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"8 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leipzig","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}