{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T06:43:03Z","timestamp":1773038583598,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319596464","type":"print"},{"value":"9783319596471","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59647-1_25","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T22:53:30Z","timestamp":1494629610000},"page":"338-354","source":"Crossref","is-referenced-by-count":13,"title":["AdaGraph: Adaptive Graph-Based Algorithms for Spam Detection in Social Networks"],"prefix":"10.1007","author":[{"given":"Amira","family":"Soliman","sequence":"first","affiliation":[]},{"given":"Sarunas","family":"Girdzijauskas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: SP Symposium, pp. 447\u2013462. IEEE (2011)","DOI":"10.1109\/SP.2011.25"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., F\u00e9legyh\u00e1zi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., et al.: Click trajectories: end-to-end analysis of the spam value chain. In: SP Symposium, pp. 431\u2013446. IEEE (2011)","DOI":"10.1109\/SP.2011.24"},{"key":"25_CR3","unstructured":"Lee, S., Kim, J.: Warningbird: detecting suspicious urls in twitter stream. In: NDSS (2012)"},{"key":"25_CR4","unstructured":"Gao, H., Chen, Y., Lee, K., Palsetia, D., Choudhary, A.N.: Towards online spam filtering in social networks. In: NDSS (2012)"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"C Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318\u2013337. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-23644-0_17"},{"issue":"8","key":"25_CR6","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"Inf. Forensics Secur."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Amleshwaram, A.A., Reddy, N., Yadav, S., Gu, G., Yang, C.: Cats: characterizing automation of twitter spammers. In: COMSNET 2013, pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/COMSNETS.2013.6465541"},{"key":"25_CR8","unstructured":"Zhu, Y., Wang, X., Zhong, E., Liu, N.N., Li, H., Yang, Q.: Discovering spammers in social networks. In: AAAI 2012 (2012)"},{"issue":"8","key":"25_CR9","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992\u20133000 (2013)","journal-title":"Expert Syst. Appl."},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Datta, A., Buchegger, S., Vu, L.-H., Strufe, T., Rzadca, K.: Decentralized online social networks. In: Handbook of Social Network Technologies and Applications, pp. 349\u2013378. Springer, New York (2010)","DOI":"10.1007\/978-1-4419-7142-5_17"},{"issue":"4","key":"25_CR11","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1080\/00018730110112519","volume":"51","author":"SN Dorogovtsev","year":"2002","unstructured":"Dorogovtsev, S.N., Mendes, J.F.: Evolution of networks. Adv. Phys. 51(4), 1079\u20131187 (2002)","journal-title":"Adv. Phys."},{"key":"25_CR12","unstructured":"Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., Beaton, M.: Teens, social media, and privacy, vol. 21. Pew Research Center (2013)"},{"issue":"2","key":"25_CR13","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MITP.2016.36","volume":"18","author":"C Chen","year":"2016","unstructured":"Chen, C., Zhang, J., Xiang, Y., Zhou, W., Oliver, J.: Spammers are becoming \u201csmarter\u201d on twitter. IT Prof. 18(2), 66\u201370 (2016)","journal-title":"IT Prof."},{"issue":"23","key":"25_CR14","doi-asserted-by":"crossref","first-page":"8577","DOI":"10.1073\/pnas.0601602103","volume":"103","author":"ME Newman","year":"2006","unstructured":"Newman, M.E.: Modularity and community structure in networks. Proc. Natl. Acad. Sci. 103(23), 8577\u20138582 (2006)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Rahimian, F., Girdzijauskas, S., Haridi, S.: Parallel community detection for cross-document coreference. In: WIC, vol. 2, pp. 46\u201353. IEEE\/ACM (2014)","DOI":"10.1109\/WI-IAT.2014.79"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Tan, E., Guo, L., Chen, S., Zhang, X., Zhao, Y.: Unik: unsupervised social network spam detection. In: CIKM 2013, pp. 479\u2013488. ACM (2013)","DOI":"10.1145\/2505515.2505581"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Yang, Z., Wilson, C., Wang, X., Gao, T., Zhao, B.Y., Dai, Y.: Uncovering social network sybils in the wild. In: TKDD 2014, vol. 8, no. 1, p. 2 (2014)","DOI":"10.1145\/2556609"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59647-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T23:01:31Z","timestamp":1494630091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59647-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596464","9783319596471"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59647-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}