{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T01:24:25Z","timestamp":1768353865522,"version":"3.49.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319180373","type":"print"},{"value":"9783319180380","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18038-0_10","type":"book-chapter","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T06:46:36Z","timestamp":1429166796000},"page":"122-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Retweeting Activity on Twitter: Signs of Deception"],"prefix":"10.1007","author":[{"given":"Maria","family":"Giatsoglou","sequence":"first","affiliation":[]},{"given":"Despoina","family":"Chatzakou","sequence":"additional","affiliation":[]},{"given":"Neil","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[]},{"given":"Athena","family":"Vakali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,17]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Beutel, A., et al.: CopyCatch: stopping group attacks by spotting lockstep behavior in social networks. In: WWW, pp. 119\u2013130. ACM (2013)","DOI":"10.1145\/2488388.2488400"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Chu, Z., et al.: Who is Tweeting on Twitter: Human, Bot, or Cyborg? ACSAC, 21\u201330 (2010)","DOI":"10.1145\/1920261.1920265"},{"issue":"15","key":"10_CR3","doi-asserted-by":"publisher","first-page":"5273","DOI":"10.1088\/0305-4470\/20\/15\/039","volume":"20","author":"B Derrida","year":"1987","unstructured":"Derrida, B., et al.: Statistical Properties of Randomly Broken Objects and of Multivalley Structures in Disordered Systems. Journal of Physics A: Mathematical and General 20(15), 5273\u20135288 (1987)","journal-title":"Journal of Physics A: Mathematical and General"},{"key":"10_CR4","first-page":"17","volume":"5","author":"P Erdos","year":"1960","unstructured":"Erdos, P., et al.: On the evolution of Random Graphs. Publ. Math. Inst. Hungary. Acad. Sci. 5, 17\u201361 (1960)","journal-title":"Publ. Math. Inst. Hungary. Acad. Sci."},{"key":"10_CR5","unstructured":"Ghosh, R., et al.: Entropy-based classification of \u2018retweeting\u2019 activity on twitter. In: KDD Workshop on Social Network Analysis (SNA-KDD) (2011)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-319-06608-0_11","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"M Jiang","year":"2014","unstructured":"Jiang, M., Cui, P., Beutel, A., Faloutsos, C., Yang, S.: Inferring strange behavior from connectivity pattern in social networks. In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y. (eds.) PAKDD 2014, Part I. LNCS, vol. 8443, pp. 126\u2013138. Springer, Heidelberg (2014)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Kempe, D., et al.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 137\u2013146. ACM, New York (2003)","DOI":"10.1145\/956750.956769"},{"key":"10_CR8","unstructured":"Kurt, T., et al.: Suspended Accounts in Retrospect: an Analysis of Twitter Spam. IMC, 243\u2013258 (2011)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Kwak, H., et al.: What is Twitter, a Social Network or a News Media? In: WWW, pp. 591\u2013600 (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"10_CR10","first-page":"985","volume":"11","author":"J Leskovec","year":"2010","unstructured":"Leskovec, J., et al.: Kronecker Graphs: An Approach to Modeling Networks. JMLR 11, 985\u20131042 (2010)","journal-title":"JMLR"},{"key":"10_CR11","unstructured":"Lin, P.-C., et al.: A Study of Effective Features for Detecting Long-surviving Twitter Spam Accounts. ICACT 841 (2013)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-06608-0_1","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"H-H Mao","year":"2014","unstructured":"Mao, H.-H., Wu, C.-J., Papalexakis, E.E., Faloutsos, C., Lee, K.-C., Kao, T.-C.: MalSpot: Multi\n$$^\\text{2 }$$\n malicious network behavior patterns analysis. In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y. (eds.) PAKDD 2014, Part I. LNCS, vol. 8443, pp. 1\u201314. Springer, Heidelberg (2014)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Pandit, S., et al.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: WWW, pp. 201\u2013210. ACM (2007)","DOI":"10.1145\/1242572.1242600"},{"key":"10_CR14","unstructured":"Rao, A., et al.: Modeling and Analysis of Real World Networks using Kronecker Graphs. Project report (2010)"},{"key":"10_CR15","volume-title":"Fractals, Chaos, Power Laws","author":"M Schroeder","year":"1991","unstructured":"Schroeder, M.: Fractals, Chaos, Power Laws, 6th edn. W. H. Freeman, New York (1991)","edition":"6"},{"issue":"7","key":"10_CR16","doi-asserted-by":"publisher","first-page":"e65774","DOI":"10.1371\/journal.pone.0065774","volume":"8","author":"G Tavares","year":"2013","unstructured":"Tavares, G., et al.: Scaling-Laws of Human Broadcast Communication Enable Distinction between Human, Corporate and Robot Twitter Users. PLoS ONE 8(7), e65774 (2013)","journal-title":"PLoS ONE"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-642-40994-3_31","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"X Wu","year":"2013","unstructured":"Wu, X., Feng, Z., Fan, W., Gao, J., Yu, Y.: Detecting marionette microblog users for improved information credibility. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013, Part III. LNCS, vol. 8190, pp. 483\u2013498. Springer, Heidelberg (2013)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Yang, C., et al.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: WWW, pp. 71\u201380 (2012)","DOI":"10.1145\/2187836.2187847"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18038-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T07:02:37Z","timestamp":1674198157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18038-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319180373","9783319180380"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18038-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}