{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T23:47:14Z","timestamp":1725925634374},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_57","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T16:19:11Z","timestamp":1512663551000},"page":"898-904","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection"],"prefix":"10.1007","author":[{"given":"Tingmin","family":"Wu","sequence":"first","affiliation":[]},{"given":"Derek","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Alghamdi, B., Watson, J., Xu, Y.: Toward detecting malicious links in online social networks through user behavior. In: IEEE\/WIC\/ACM International Conference on Web Intelligence Workshops (WIW), pp. 5\u20138. IEEE (2016)","DOI":"10.1109\/WIW.2016.014"},{"issue":"1","key":"57_CR2","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1111\/coin.12017","volume":"31","author":"F Atefeh","year":"2015","unstructured":"Atefeh, F., Khreich, W.: A survey of techniques for event detection in Twitter. Comput. Intell. 31(1), 132\u2013164 (2015)","journal-title":"Comput. Intell."},{"issue":"4","key":"57_CR3","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1109\/TIFS.2016.2621888","volume":"12","author":"C Chen","year":"2017","unstructured":"Chen, C., Wang, Y., Zhang, J., Xiang, Y., Zhou, W., Min, G.: Statistical features-based real-time detection of drifted Twitter spam. IEEE Trans. Inf. Forensics Secur. 12(4), 914\u2013925 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhang, J., Chen, X., Xiang, Y., Zhou, W.: 6 million spam tweets: a large ground truth for timely Twitter spam detection. In: 2015 IEEE International Conference on Communications (ICC), pp. 7065\u20137070. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249453"},{"issue":"2","key":"57_CR5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MITP.2016.36","volume":"18","author":"C Chen","year":"2016","unstructured":"Chen, C., Zhang, J., Xiang, Y., Zhou, W., Oliver, J.: Spammers are becoming \u201csmarter\u201d on Twitter. IT Prof. 18(2), 66\u201370 (2016)","journal-title":"IT Prof."},{"issue":"3","key":"57_CR6","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/TCSS.2016.2516039","volume":"2","author":"C Chen","year":"2015","unstructured":"Chen, C., Zhang, J., Xie, Y., Xiang, Y., Zhou, W., Hassan, M.M., AlElaiwi, A., Alrubaian, M.: A performance evaluation of machine learning-based streaming spam tweets detection. IEEE Trans. Comput. Soc. Syst. 2(3), 65\u201376 (2015)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"2","key":"57_CR7","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1023\/A:1022602019183","volume":"3","author":"DE Goldberg","year":"1988","unstructured":"Goldberg, D.E., Holland, J.H.: Genetic algorithms and machine learning. Mach. Learn. 3(2), 95\u201399 (1988)","journal-title":"Mach. Learn."},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Hu, X., Tang, J., Liu, H.: Online social spammer detection. In: AAAI, pp. 59\u201365 (2014)","DOI":"10.1609\/aaai.v28i1.8728"},{"key":"57_CR9","unstructured":"Kumar, R.K., Poonkuzhali, G., Sudhakar, P.: Comparative study on email spam classifier using data mining techniques. In: Proceedings of the International Multi Conference of Engineers and Computer Scientists, vol. 1, pp. 14\u201316 (2012)"},{"key":"57_CR10","doi-asserted-by":"crossref","unstructured":"Liu, S., Zhang, J., Xiang, Y.: Statistical detection of online drifting twitter spam: invited paper. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 1\u201310. ACM (2016)","DOI":"10.1145\/2897845.2897928"},{"key":"57_CR11","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller, Z., Dickinson, B., Deitrick, W., Hu, W., Wang, A.H.: Twitter spammer detection using data stream clustering. Inf. Sci. 260, 64\u201373 (2014)","journal-title":"Inf. Sci."},{"key":"57_CR12","doi-asserted-by":"crossref","unstructured":"Wu, T., Liu, S., Zhang, J., Xiang, Y.: Twitter spam detection based on deep learning. In: Proceedings of the Australasian Computer Science Week Multiconference, p. 3. ACM (2017)","DOI":"10.1145\/3014812.3014815"},{"issue":"8","key":"57_CR13","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T01:31:03Z","timestamp":1660095063000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}