{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:01:24Z","timestamp":1764687684069},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_32","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T01:50:57Z","timestamp":1444787457000},"page":"473-482","source":"Crossref","is-referenced-by-count":18,"title":["A Model for Identifying Misinformation in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Sotirios","family":"Antoniadis","sequence":"first","affiliation":[]},{"given":"Iouliana","family":"Litou","sequence":"additional","affiliation":[]},{"given":"Vana","family":"Kalogeraki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Internet Measurement Conference, pp. 243\u2013258 (2011)","DOI":"10.1145\/2068816.2068840"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: ACM Conference on Computer and Communications Security, pp. 681\u2013683 (2010)","DOI":"10.1145\/1866307.1866396"},{"key":"32_CR3","unstructured":"Zubiaga, A., Ji, H.: Tweet, but verify: Epistemic study of information verification on twitter (2013). CoRR, vol. abs\/1312.5297"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Gupta, A., Lamba, H., Kumaraguru, P., Joshi, A.: Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Ser. WWW 2013 Companion (2013)","DOI":"10.1145\/2487788.2488033"},{"issue":"5","key":"32_CR5","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1108\/IntR-05-2012-0095","volume":"23","author":"C Castillo","year":"2013","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Predicting information credibility in time-sensitive social media. Internet Research 23(5), 560\u2013588 (2013)","journal-title":"Internet Research"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-30428-6_4","volume-title":"Intelligence and Security Informatics","author":"X Xia","year":"2012","unstructured":"Xia, X., Yang, X., Wu, C., Li, S., Bao, L.: Information credibility on twitter in emergency situation. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds.) PAISI 2012. LNCS, vol. 7299, pp. 45\u201359. Springer, Heidelberg (2012)"},{"key":"32_CR7","unstructured":"Bagrow, J.P., Wang, D., Barabasi, A.-L.: Collective response of human populations to large-scale emergencies (2011). CoRR, vol. abs\/1106.0560"},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-13062-5_6","volume-title":"Advances in Intelligent Data Analysis IX","author":"M Guy","year":"2010","unstructured":"Guy, M., Earle, P., Ostrum, C., Gruchalla, K., Horvath, S.: Integration and dissemination of citizen reported and seismically derived earthquake information via social network technologies. In: Cohen, P.R., Adams, N.M., Berthold, M.R. (eds.) IDA 2010. LNCS, vol. 6065, pp. 42\u201353. Springer, Heidelberg (2010)"},{"key":"32_CR9","unstructured":"Weka. \n                      http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"issue":"12","key":"32_CR10","doi-asserted-by":"publisher","first-page":"2544","DOI":"10.1002\/asi.21416","volume":"61","author":"M Thelwall","year":"2010","unstructured":"Thelwall, M., Buckley, K., Paltoglou, G., Cai, D., Kappas, A.: Sentiment in short strength detection informal text. J. Am. Soc. Inf. Sci. Technol. 61(12), 2544\u20132558 (2010)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: ACSAC, pp. 1\u20139 (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"32_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-319-13734-6_16","volume-title":"Social Informatics","author":"A Gupta","year":"2014","unstructured":"Gupta, A., Kumaraguru, P., Castillo, C., Meier, P.: Tweetcred: real-time credibility assessment of content on twitter. In: Aiello, L.M., McFarland, D. (eds.) SocInfo 2014. LNCS, vol. 8851, pp. 228\u2013243. Springer, Heidelberg (2014)"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-642-28997-2_31","volume-title":"Advances in Information Retrieval","author":"M Bosma","year":"2012","unstructured":"Bosma, M., Meij, E., Weerkamp, W.: A framework for unsupervised spam detection in social networking sites. In: Baeza-Yates, R., de Vries, A.P., Zaragoza, H., Cambazoglu, B.B., Murdock, V., Lempel, R., Silvestri, F. (eds.) ECIR 2012. LNCS, vol. 7224, pp. 364\u2013375. Springer, Heidelberg (2012)"},{"key":"32_CR14","unstructured":"Anagnostopoulos, A., Bessi, A., Caldarelli, G., Vicario, M.D., Petroni, F., Scala, A., Zollo, F., Quattrociocchi, W.: Viral misinformation: The role of homophily and polarization (2014). CoRR, vol. abs\/1411.2893"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-23496-5_13","volume-title":"Autonomic and Trusted Computing","author":"M McCord","year":"2011","unstructured":"McCord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: Calero, J.M.A., Yang, L.T., M\u00e1rmol, F.G., Garc\u00eda Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 175\u2013186. Springer, Heidelberg (2011)"},{"key":"32_CR16","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: CEAS (2010)"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D.: Abbadi, A.E.: Limiting the spread of misinformation in social networks. In: WWW, pp. 665\u2013674 (2011)","DOI":"10.1145\/1963405.1963499"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Faloutsos, M.: Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams. In: WWW (Companion Volume), pp. 495\u2013496 (2013)","DOI":"10.1145\/2487788.2487980"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, P.K.: Understanding and combating link farming in the twitter social network. In: WWW, pp. 61\u201370 (2012)","DOI":"10.1145\/2187836.2187846"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we rt? In: Proceedings of the First Workshop on Social Media Analytics, ser. SOMA 2010, pp. 71\u201379. ACM, New York (2010)","DOI":"10.1145\/1964858.1964869"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Y., Wu, B., Wang, B., Li, G.: Sdhm: a hybrid model for spammer detection in weibo. In: 2014 IEEE\/ACM International Conference on ASONAM, pp. 942\u2013947, August 2014","DOI":"10.1109\/ASONAM.2014.6921699"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T02:02:19Z","timestamp":1559268139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}