{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T15:07:04Z","timestamp":1748617624690,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470719"},{"type":"electronic","value":"9783319470726"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47072-6_6","type":"book-chapter","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T01:20:20Z","timestamp":1474420820000},"page":"78-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks"],"prefix":"10.1007","author":[{"given":"\u00c1lvaro","family":"Garc\u00eda-Recuero","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Burdges","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Grothoff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"6_CR1","volume-title":"Pattern Recognition and Machine Learning","author":"CM Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning, 1st edn. Springer, New York (2006)","edition":"1"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"6_CR3","unstructured":"Breiman, L.: Arcing the edge. Technical report, Technical Report 486, Statistics Department, University of California at Berkeley (1997)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-35404-5_17","volume-title":"Cryptology and Network Security","author":"E Cristofaro De","year":"2012","unstructured":"De Cristofaro, E., Gasti, P., Tsudik, G.: Fast and private computation of cardinality of set intersection and union. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 218\u2013231. Springer, Heidelberg (2012)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Evans, N.S., Polot, B., Grothoff, C.: Efficient and secure decentralized network size estimation. In: IFIP International Conferences on Networking (2012)","DOI":"10.1007\/978-3-642-30045-5_23"},{"key":"6_CR6","unstructured":"Gipp, B., Meuschke, N., Gernandt, A.: Decentralized trusted timestamping using the crypto currency bitcoin. In: iConference. iSchools (2015)"},{"key":"6_CR7","unstructured":"Grothoff, C., Porup, J.M.: The NSA\u2019s SKYNET program may be killing thousands of innocent people. ARS Technica UK (2016). https:\/\/hal.inria.fr\/hal-01278193"},{"issue":"3","key":"6_CR8","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1080\/13811118.2010.494133","volume":"14","author":"S Hinduja","year":"2010","unstructured":"Hinduja, S., Patchin, J.W.: Bullying, cyberbullying and suicide. Arch. Suicide Res. 14(3), 206\u2013221 (2010)","journal-title":"Arch. Suicide Res."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Kramer, A., Guillory, J., Hancock, J.: Experimental evidence of massive-scale emotional contagion through social networks. In: Proceedings of the National Academy of Sciences of the United States of America (2013)","DOI":"10.1073\/pnas.1320040111"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1089\/cyber.2011.0588","volume":"15","author":"C Langos","year":"2012","unstructured":"Langos, C.: Cyberbullying: The challenge to define. Cyberpsychology Behav. Soc. Networking 15, 285\u2013289 (2012)","journal-title":"Cyberpsychology Behav. Soc. Networking"},{"key":"6_CR11","unstructured":"v. Loesch, C., Toth, G.X., Baumann, M.: Scalability & paranoia in a decentralized social network. In: Federated Social Web. Berlin, Germany (2011)"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2013.07.007","volume":"250","author":"V L\u00f3pez","year":"2013","unstructured":"L\u00f3pez, V., Fern\u00e1ndez, A., Garc\u00eda, S., Palade, V., Herrera, F.: An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics. Inf. Sci. 250, 113\u2013141 (2013)","journal-title":"Inf. Sci."},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"195","DOI":"10.2105\/AJPH.2011.300608","volume":"102","author":"D Luxton","year":"2012","unstructured":"Luxton, D., June, J., Fairall, J.: Social media and suicide: A public health perspective. Am. J. Public Health 102, 195\u2013200 (2012)","journal-title":"Am. J. Public Health"},{"key":"6_CR14","unstructured":"Mandeep K. Dhami, P.: Behavioural Science Support for JTRIG\u2019s Effects and Online HUMINT Operations March 2011. http:\/\/www.statewatch.org\/news\/2015\/jun\/behavioural-science-support-for-jtrigs-effects.pdf"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Stein, T., Chen, E., Mangla, K.: Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, p. 8. ACM (2011)","DOI":"10.1145\/1989656.1989664"},{"key":"6_CR16","unstructured":"Thomas, K., McCoy, D., Grier, C., Kolcz, A., Paxson, V.: Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse. In: USENIX Security Symposium (2013)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47072-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T22:09:12Z","timestamp":1657318152000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47072-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470719","9783319470726"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47072-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}