{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:26:29Z","timestamp":1774074389736,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319289397","type":"print"},{"value":"9783319289403","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28940-3_10","type":"book-chapter","created":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T12:04:06Z","timestamp":1453377846000},"page":"123-134","source":"Crossref","is-referenced-by-count":11,"title":["Detecting Automatically-Generated Arabic Tweets"],"prefix":"10.1007","author":[{"given":"Hind","family":"Almerekhi","sequence":"first","affiliation":[]},{"given":"Tamer","family":"Elsayed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,22]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: Phishari: automatic realtime phishing detection on twitter. In: IEEE eCrime Researchers Summit (eCrime), pp. 1\u201312. IEEE (2012)","DOI":"10.1109\/eCrime.2012.6489521"},{"issue":"6","key":"10_CR2","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9(6), 811\u2013824 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference on World Wide Web (WWW), pp. 61\u201370. ACM (2012)","DOI":"10.1145\/2187836.2187846"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Hasanain, M., Elsayed, T., Magdy, W.: Identification of answer-seeking questions in arabic microblogs. In: Proceedings of the 23rd ACM International Conference on Information and Knowledge Management (CIKM), pp. 1839\u20131842. ACM (2014)","DOI":"10.1145\/2661829.2661959"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Hentschel, M., Alonso, O., Counts, S., Kandylas, V.: Finding users we trust: scaling up verified twitter users using their communication patterns. In: Eighth International AAAI Conference on Web and Social Media (ICWSM) (2014)","DOI":"10.1609\/icwsm.v8i1.14569"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Hu, X., Tang, J., Liu, H.: Online social spammer detection. In: Twenty-Eighth AAAI Conference on Artificial Intelligence (AAAI) (2014)","DOI":"10.1109\/ICDM.2014.141"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1007\/978-3-642-24769-9_46","volume-title":"Progress in Artificial Intelligence","author":"G Laboreiro","year":"2011","unstructured":"Laboreiro, G., Sarmento, L., Oliveira, E.: Identifying automatic posting systems in microblogs. In: Antunes, L., Pinto, H.S. (eds.) EPIA 2011. LNCS, vol. 7026, pp. 634\u2013648. Springer, Heidelberg (2011)"},{"key":"10_CR8","unstructured":"Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: Fifth International AAAI Conference on Web and Social Media (ICWSM). Citeseer (2011)"},{"issue":"8","key":"10_CR9","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992\u20133000 (2013)","journal-title":"Expert Syst. Appl."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Wald, R., Khoshgoftaar, T.M., Napolitano, A., Sumner, C.: Predicting susceptibility to social bots on twitter. In: IEEE 14th International Conference on Information Reuse and Integration (IRI), pp. 6\u201313. IEEE (2013)","DOI":"10.1109\/IRI.2013.6642447"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web (WWW), pp. 71\u201380. ACM (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-19260-9_11","volume-title":"Passive and Active Measurement","author":"CM Zhang","year":"2011","unstructured":"Zhang, C.M., Paxson, V.: Detecting and analyzing automated activity on twitter. In: Spring, N., Riley, G.F. (eds.) PAM 2011. LNCS, vol. 6579, pp. 102\u2013111. Springer, Heidelberg (2011)"},{"key":"10_CR13","unstructured":"Zhu, Y., Wang, X., Zhong, E., Liu, N.N., Li, H., Yang, Q.: Discovering spammers in social networks. In: Twenty-Sixth AAAI Conference on Artificial Intelligence (AAAI) (2012)"},{"issue":"3","key":"10_CR14","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1002\/asi.23186","volume":"66","author":"A Zubiaga","year":"2014","unstructured":"Zubiaga, A., Spina, D., Mart\u00ednez, R., Fresno, V.: Real-time classification of twitter trends. J. Assoc. Inf. Sci. Technol. 66(3), 462\u2013473 (2014)","journal-title":"J. Assoc. Inf. Sci. Technol."}],"container-title":["Lecture Notes in Computer Science","Information Retrieval Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28940-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T15:25:48Z","timestamp":1692199548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28940-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319289397","9783319289403"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28940-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}