{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:23:59Z","timestamp":1725909839999},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319648606"},{"type":"electronic","value":"9783319648613"}],"license":[{"start":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T00:00:00Z","timestamp":1504137600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-64861-3_56","type":"book-chapter","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T08:58:04Z","timestamp":1504083484000},"page":"600-609","source":"Crossref","is-referenced-by-count":2,"title":["Colored Petri Net Model for Blocking Misleading Information Propagation in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Torky","sequence":"first","affiliation":[]},{"given":"Ali","family":"Meligy","sequence":"additional","affiliation":[]},{"given":"Hani","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Aboul Ella","family":"Hassanein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,31]]},"reference":[{"issue":"1","key":"56_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-014-0014-x","volume":"4","author":"KP Kumar","year":"2014","unstructured":"Kumar, K.P., Geethakumari, G.: Detecting misinformation in online social networks using cognitive psychology. Hum.-Centric Comput. Inf. Sci. 4(1), 1\u201322 (2014). Springer","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"issue":"1","key":"56_CR2","first-page":"1","volume":"18","author":"NA Karlova","year":"2013","unstructured":"Karlova, N.A., Fisher, K.E.: Plz RT: a social diffusion model of misinformation and disinformation for understanding human information behavior. Inform. Res. 18(1), 1\u201317 (2013)","journal-title":"Inform. Res."},{"key":"56_CR3","doi-asserted-by":"crossref","unstructured":"Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceeding of PSOSM 2012 Proceedings of the 1st Workshop on Privacy and Security in Online Social Media (2012)","DOI":"10.1145\/2185354.2185356"},{"issue":"1","key":"56_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2200\/S00416ED1V01Y201204HLT016","volume":"5","author":"B Liu","year":"2012","unstructured":"Liu, B.: Sentiment analysis and opinion mining. Synth. Lect. Hum. Lang. Technol. 5(1), 1\u2013167 (2012)","journal-title":"Synth. Lect. Hum. Lang. Technol."},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Torky, M., Babarse, R., Ibrahim, R., Hassanien, A.E., Schaefer, G., Zhu, S.Y.: Credibility investigation of newsworthy tweets using a visualising petri net model. In: IEEE International Conference on Systems, Man, and Cybernetics (SMC), 9\u201312 October, Budapest, Hungary(2016)","DOI":"10.1109\/SMC.2016.7844842"},{"key":"56_CR6","unstructured":"Jensen, K.: Basic Concepts, Analysis Methods and Practical Use, vol. 1. Springer Science & Business Media (2013)"},{"key":"56_CR7","doi-asserted-by":"crossref","unstructured":"Cstillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: WWW 2011 International Conference, Information Credibility, 28 March\u20131 April, Hyderabad, India (2011)","DOI":"10.1145\/1963405.1963500"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Morris, M.R., Counts, S., Roseway, A., Hoff, A., Schwarz, J.: Tweeting is believing understanding microblog credibility perceptions. In: CSCW 2012 Conference, 11\u201315 February. ACM, Seattle (2012)","DOI":"10.1145\/2145204.2145274"},{"key":"56_CR9","doi-asserted-by":"crossref","unstructured":"Abbasi, M.A., Liu, H.: Measuring user credibility in social media. In: International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, pp. 441\u2013448. Springer, Heidelberg, April 2013","DOI":"10.1007\/978-3-642-37210-0_48"},{"key":"56_CR10","unstructured":"Nguyen, D.T., Nguyen, N.P., Thai, M.T.: Sources of misinformation in online social networks: who to suspect? Academia (2014)"},{"key":"56_CR11","unstructured":"Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: identifying misinformation in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, EMNLP 2011, pp. 1589\u20131599. Association for Computational Linguistics, Edinburgh (2011)"},{"key":"56_CR12","doi-asserted-by":"crossref","unstructured":"Lappas, T., Terzi, E., Gunopulos, D., Mannila, H.: Finding effectors in social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1059\u20131068, July 2010","DOI":"10.1145\/1835804.1835937"},{"issue":"10","key":"56_CR13","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1016\/j.comnet.2013.04.002","volume":"57","author":"NP Nguyen","year":"2013","unstructured":"Nguyen, N.P., Yan, G., Thai, M.T.: Analysis of misinformation containment in online social networks. Comput. Netw. 57(10), 2133\u20132146 (2013). Elsevier","journal-title":"Comput. Netw."},{"key":"56_CR14","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, pp. 665\u2013674. ACM, Hyderabad, March 2011","DOI":"10.1145\/1963405.1963499"},{"key":"56_CR15","unstructured":"Simulator functions CPN Tools Homepage, http:\/\/cpntools.org\/documentation\/tasks\/simulation\/simulator-functions"},{"key":"56_CR16","unstructured":"Gentry, J.: Package Twitter R (2011), http:\/\/cran.rproject.org\/web\/packages\/twitterR\/twitterR.pdf"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64861-3_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T19:19:55Z","timestamp":1570043995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64861-3_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,31]]},"ISBN":["9783319648606","9783319648613"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64861-3_56","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,8,31]]}}}