{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:57:40Z","timestamp":1743019060751,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319126906"},{"type":"electronic","value":"9783319126913"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12691-3_40","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T21:11:32Z","timestamp":1415999492000},"page":"547-556","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Optimal Containment of Misinformation in Social Media: A Scenario-Based Approach"],"prefix":"10.1007","author":[{"given":"Yongjia","family":"Song","sequence":"first","affiliation":[]},{"given":"Thang N.","family":"Dinh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,13]]},"reference":[{"key":"40_CR1","unstructured":"Izadi, E.: Important alert from Chinese state media: No, Ebola isnt a zombie virus, The Washington Post (2014). http:\/\/wapo.st\/1mRyC09. Accessed 21 August 2014"},{"issue":"2","key":"40_CR2","doi-asserted-by":"publisher","first-page":"9:1","DOI":"10.1145\/1514888.1514892","volume":"3","author":"M Kimura","year":"2009","unstructured":"Kimura, M., Saito, K., Motoda, H.: Blocking links to minimize contamination spread in a social network. ACM Trans. Knowl. Discov. Data 3(2), 9:1\u20139:23 (2009)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, WWW \u201911, pp. 665\u2013674. ACM, New York (2011)","DOI":"10.1145\/1963405.1963499"},{"key":"40_CR4","doi-asserted-by":"publisher","first-page":"061911","DOI":"10.1103\/PhysRevE.84.061911","volume":"84","author":"CM Schneider","year":"2011","unstructured":"Schneider, C.M., Mihaljev, T., Havlin, S., Herrmann, H.J.: Suppressing epidemics with a limited amount of immunization units. Phys. Rev. E 84, 061911 (2011)","journal-title":"Phys. Rev. E"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"He, X., Song, G., Chen, W., Jiang, Q.: Influence blocking maximization in social networks under the competitive linear threshold model. In: SDM, pp. 463\u2013474. SIAM (2012)","DOI":"10.1137\/1.9781611972825.40"},{"issue":"10","key":"40_CR6","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1016\/j.comnet.2013.04.002","volume":"57","author":"NP Nguyen","year":"2013","unstructured":"Nguyen, N.P., Yan, G., Thai, M.T.: Analysis of misinformation containment in online social networks. Comput. Netw. 57(10), 2133\u20132146 (2013)","journal-title":"Comput. Netw."},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Kuhlman, C., Tuli, G., Swarup, S., Marathe, M., Ravi, S.: Blocking simple and complex contagion by edge removal. In: 2013 IEEE 13th International Conference on Data Mining (ICDM), pp. 399\u2013408, Dec 2013","DOI":"10.1109\/ICDM.2013.47"},{"issue":"1","key":"40_CR8","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10589-013-9589-9","volume":"57","author":"M Hemmati","year":"2014","unstructured":"Hemmati, M., Cole Smith, J., Thai, M.T.: A cutting-plane algorithm for solving a weighted influence interdiction problem. Comput. Optim. Appl. 57(1), 71\u2013104 (2014)","journal-title":"Comput. Optim. Appl."},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: KDD\u201903, pp. 137\u2013146. ACM, New York (2003)","DOI":"10.1145\/956750.956769"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, WSDM \u201910, pp. 241\u2013250. ACM, New York (2010)","DOI":"10.1145\/1718487.1718518"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: ACM KDD \u201907, pp. 420\u2013429. ACM, New York (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"40_CR12","series-title":"Lecture Notes in Control and Information Sciences","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/BFb0006528","volume-title":"Optimization Techniques","author":"M Minoux","year":"1978","unstructured":"Minoux, M.: Accelerated greedy algorithms for maximizing submodular set functions. In: Stoer, J. (ed.) Optimization Techniques. Lecture Notes in Control and Information Sciences, vol. 7, pp. 234\u2013243. Springer, Heidelberg (1978)"},{"issue":"3","key":"40_CR13","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1137\/08073617X","volume":"23","author":"N Chen","year":"2009","unstructured":"Chen, N.: On the approximability of influence in social networks. SIAM J. Discrete Math. 23(3), 1400\u20131415 (2009)","journal-title":"SIAM J. Discrete Math."},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: ACM KDD \u201910, pp. 1029\u20131038. ACM, New York (2010)","DOI":"10.1145\/1835804.1835934"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Dinh, T., Zhang, H., Nguyen, D., Thai, M.: Cost-effective viral marketing for time-critical campaigns in large-scale social networks. IEEE\/ACM Trans. Networking (2014)","DOI":"10.1109\/TNET.2013.2290714"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, H., Dinh, T., Thai, M.: Maximizing the spread of positive influence in online social networks. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 317\u2013326, July 2013","DOI":"10.1109\/ICDCS.2013.37"},{"key":"40_CR17","first-page":"17","volume":"5","author":"P Erdos","year":"1960","unstructured":"Erdos, P., Renyi, A.: On the evolution of random graphs. Publ. Math. Inst. Hungary. Acad. Sci. 5, 17\u201361 (1960)","journal-title":"Publ. Math. Inst. Hungary. Acad. Sci."},{"key":"40_CR18","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0378-4371(00)00018-2","volume":"281","author":"A Barabasi","year":"2000","unstructured":"Barabasi, A., Albert, R., Jeong, H.: Scale-free characteristics of random networks: the topology of the world-wide web. Physica A 281, 69\u201377 (2000)","journal-title":"Physica A"},{"issue":"6684","key":"40_CR19","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2019small-world\u2019 networks. Nature 393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"key":"40_CR20","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1140\/epjb\/e2008-00425-1","volume":"66","author":"G Agarwal","year":"2008","unstructured":"Agarwal, G., Kempe, D.: Modularity-maximizing graph communities via mathematical programming. Eur. Phys. J. B 66, 409\u2013418 (2008)","journal-title":"Eur. Phys. J. B"}],"container-title":["Lecture Notes in Computer Science","Combinatorial Optimization and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12691-3_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T03:38:16Z","timestamp":1676000296000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12691-3_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319126906","9783319126913"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12691-3_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"13 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}