{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:57:15Z","timestamp":1743109035799,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238616"},{"type":"electronic","value":"9783319238623"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23862-3_3","type":"book-chapter","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T14:06:06Z","timestamp":1444745166000},"page":"20-28","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of the Time Characteristics of Network Water Army Based on BBS Information"],"prefix":"10.1007","author":[{"given":"Chunlong","family":"Fan","sequence":"first","affiliation":[]},{"given":"Chang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hengchao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"3_CR1","unstructured":"Zhu, X.: The legal thinking of water army phenomenon of Mengniu and Yili PR. Lanzhou University, Gansu (2013)"},{"key":"3_CR2","first-page":"180","volume":"S2","author":"Z Han","year":"2013","unstructured":"Han, Z., Xu, F., Duan, D.: Equal probability map navy recognition model for microblogging. Comput. Res. Dev. S2, 180\u2013186 (2013)","journal-title":"Comput. Res. Dev."},{"key":"3_CR3","unstructured":"Secret network of water army survival: 50\u00a0% of the network security report posted by PR China, China Anti-Counterfeiting Report, 4, 31\u201333(2011)"},{"key":"3_CR4","first-page":"20","volume":"4","author":"X Huang","year":"2014","unstructured":"Huang, X.: Water army: film vicious internet marketing lurker. Media Obs. 4, 20\u201321 (2014)","journal-title":"Media Obs."},{"key":"3_CR5","first-page":"68","volume":"1","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y.: The intervention strategies of the network water army and the impact on the public opinion. Friends Ed. 1, 68\u201370 (2014)","journal-title":"Friends Ed."},{"key":"3_CR6","unstructured":"http:\/\/media.people.com.cn\/n\/2014\/0818\/c120837-25484101-2.html"},{"key":"3_CR7","first-page":"54","volume":"9","author":"X Fan","year":"2011","unstructured":"Fan, X.: Information dissemination model of the network of water army. Media 9, 54\u201356 (2011)","journal-title":"Media"},{"key":"3_CR8","first-page":"76","volume":"4","author":"X Lou","year":"2011","unstructured":"Lou, X., Liu, P.: Propagation analysis of network of water army. Contemp. Commun. 4, 76\u201377 (2011)","journal-title":"Contemp. Commun."},{"key":"3_CR9","first-page":"16","volume":"4","author":"Y Zhihuang","year":"2011","unstructured":"Zhihuang, Y.: Network water army types, multiple credit and governance. Guangdong Inst. Public Adm. 4, 16\u201322 (2011)","journal-title":"Guangdong Inst. Public Adm."},{"key":"3_CR10","first-page":"82","volume":"04","author":"W Lingfei","year":"2011","unstructured":"Lingfei, W.: Network of water army is what the military. Inf. Shanghai 04, 82\u201383 (2011)","journal-title":"Inf. Shanghai"},{"key":"3_CR11","first-page":"53","volume":"05","author":"Y Zhijun","year":"2011","unstructured":"Zhijun, Y., Gensheng, G.: The formation mechanism and propagation efficacy study of network of water army. New Media Res. 05, 53\u201356 (2011)","journal-title":"New Media Res."},{"key":"3_CR12","unstructured":"Linghung, C.: The study of effect network of water army of online public opinion. Anhui University, Hefei (2012)"},{"key":"3_CR13","first-page":"56","volume":"14","author":"X Fan","year":"2011","unstructured":"Fan, X.: The propagation mechanisms and countermeasures of network of water army. News Enthus. 14, 56\u201357 (2011)","journal-title":"News Enthus."},{"key":"3_CR14","unstructured":"Chen, C., Wu, K., Srinivasan, V.: Battling the internet water army: detection of hidden paid posters (2011). \n                    arXiv:1111.429v1\n                    \n                   [cs.SI]"},{"key":"3_CR15","unstructured":"Fielding, N., Cobain, I.:Revealed: US spy operation that manipulates social media. \n                    http:\/\/www.theguardian.com\/technology\/2011\/mar\/17\/us-spy-operation-social-networks"},{"key":"3_CR16","unstructured":"http:\/\/club.tech.sina.com.cn\/thread-2115773-3-1.html"},{"issue":"5","key":"3_CR17","first-page":"64","volume":"29","author":"CL Fan","year":"2012","unstructured":"Fan, C.L., Xiao, X., Yu, L., Xu, L.: Behavior analysis of network navy organization based on web forums. Shenyang Aerosp. Univ. 29(5), 64\u201367 (2012)","journal-title":"Shenyang Aerosp. Univ."},{"issue":"6","key":"3_CR18","doi-asserted-by":"publisher","first-page":"0633","DOI":"10.1103\/PhysRevE.69.066133","volume":"69","author":"MEJ Newman","year":"2004","unstructured":"Newman, M.E.J.: Fast algorithm for detecting community structure in very large networks. Phys. Rev. E 69(6), 0633 (2004)","journal-title":"Phys. Rev. E"},{"issue":"3","key":"3_CR19","first-page":"28","volume":"35","author":"CH Guo","year":"2014","unstructured":"Guo, C.H., Wang, X., Sun, L.: simulation research network culture of internet and market of the water army. Dalian Univ. Technol. Nat. Sci. 35(3), 28\u201332 (2014)","journal-title":"Dalian Univ. Technol. Nat. Sci."},{"key":"3_CR20","first-page":"46","volume":"5","author":"S Li","year":"2013","unstructured":"Li, S., Wang, J., et al.: borrow time one binding characteristics of readers interested in the visual recognition method of library and information technology. Mod. Inf. Technol. Lib. 5, 46\u201353 (2013)","journal-title":"Mod. Inf. Technol. Lib."}],"container-title":["Lecture Notes in Computer Science","Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23862-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T01:46:00Z","timestamp":1559267160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23862-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238616","9783319238623"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23862-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}