{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:57:39Z","timestamp":1760385459769},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271361"},{"type":"electronic","value":"9783319271378"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27137-8_25","type":"book-chapter","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T11:24:23Z","timestamp":1447673063000},"page":"323-336","source":"Crossref","is-referenced-by-count":1,"title":["Leveraging Behavior Diversity to Detect Spammers in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Jian","family":"Cao","sequence":"first","affiliation":[]},{"given":"Qiang","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,16]]},"reference":[{"unstructured":"Ciw team: Weibo had 167m monthly active users in q3 (2014). \n                      http:\/\/www.chinainternetwatch.com\/10735\/weibo-q3-2014","key":"25_CR1"},{"issue":"8","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Guofei, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1\u20139. ACM (2010)","key":"25_CR3","DOI":"10.1145\/1920261.1920263"},{"doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @ spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 27\u201337. ACM (2010)","key":"25_CR4","DOI":"10.1145\/1866307.1866311"},{"doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 243\u2013258. ACM (2011)","key":"25_CR5","DOI":"10.1145\/2068816.2068840"},{"doi-asserted-by":"crossref","unstructured":"Almaatouq, A., Alabdulkareem, A., Nouh, M., Shmueli, E., Alsaleh, M., Singh, V.K., Alarifi, A., Alfaris, A., Pentland, A.S.: Twitter: who gets caught? observed trends in social micro-blogging spam. In: Proceedings of the 2014 ACM Conference on Web Science, pp. 33\u201341. ACM (2014)","key":"25_CR6","DOI":"10.1145\/2615569.2615688"},{"doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web, pp. 71\u201380. ACM (2012)","key":"25_CR7","DOI":"10.1145\/2187836.2187847"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Ruan, X., Wang, H., Wang, H.: What scale of audience a campaign can reach in what price on twitter? In: INFOCOM, 2014 Proceedings IEEE, pp. 1168\u20131176. IEEE (2014)","key":"25_CR8","DOI":"10.1109\/INFOCOM.2014.6848048"},{"unstructured":"Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: COMPA: detecting compromised accounts on social networks. In: NDSS (2013)","key":"25_CR9"},{"issue":"6","key":"25_CR10","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9(6), 811\u2013824 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., J., Wilson, J., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35\u201347. ACM (2010)","key":"25_CR11","DOI":"10.1145\/1879141.1879147"},{"doi-asserted-by":"crossref","unstructured":"Tan, E., Guo, L., Chen, S., Zhang, X., Zhao, Y.: Unik: unsupervised social network spam detection. In: Proceedings of the 22nd ACM International Conference on Conference on Information and Knowledge Management, pp. 479\u2013488. ACM (2013)","key":"25_CR12","DOI":"10.1145\/2505515.2505581"},{"unstructured":"Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.N.: Towards online spam filtering in social networks. In: NDSS (2012)","key":"25_CR13"},{"issue":"8","key":"25_CR14","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992\u20133000 (2013)","journal-title":"Expert Syst. Appl."},{"unstructured":"Sina weibo api. \n                      http:\/\/open.weibo.com\/","key":"25_CR15"},{"unstructured":"Google safe browsing api. \n                      https:\/\/developers.google.com\/safe-browsing\/?hl=zh-CN","key":"25_CR16"},{"unstructured":"Virustotal. \n                      https:\/\/www.virustotal.com\/","key":"25_CR17"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27137-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T15:36:23Z","timestamp":1559316983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27137-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271361","9783319271378"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27137-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}