{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:18Z","timestamp":1725562398048},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_19","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"252-265","source":"Crossref","is-referenced-by-count":6,"title":["A Tool for Internet Chatroom Surveillance"],"prefix":"10.1007","author":[{"given":"Ahmet","family":"\u00c7amtepe","sequence":"first","affiliation":[]},{"given":"Mukkai S.","family":"Krishnamoorthy","sequence":"additional","affiliation":[]},{"given":"B\u00fclent","family":"Yener","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Kalt, C.: RFC 2810 Internet Relay Chat: Architecture (2000)","DOI":"10.17487\/rfc2810"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Kalt, C.: RFC 2811 Internet Relay Chat: Channel management (2000)","DOI":"10.17487\/rfc2811"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Kalt, C.: RFC 2812 Internet Relay Chat: Client protocol (2000)","DOI":"10.17487\/rfc2812"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Kalt, C.: RFC 2813 Internet Relay Chat: Server protocol (2000)","DOI":"10.17487\/rfc2813"},{"key":"19_CR5","unstructured":"Johns, M.S.: RFC 1413 Identification Protocol (1993)"},{"key":"19_CR6","unstructured":"Gelhausen, A.: IRC statistics (1998), http:\/\/irc.netsplit.de (accessed 10 February 2004)"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/IV.2003.1217994","volume-title":"Seventh International Conference on Information Visualization (IV 2003)","author":"P. Mutton","year":"2003","unstructured":"Mutton, P., Golbeck, J.: Visualization of semantic metadata and ontologies. In: Seventh International Conference on Information Visualization (IV 2003), pp. 300\u2013305. IEEE, Los Alamitos (2003)"},{"key":"19_CR8","unstructured":"Mutton, P.: Piespy social network bot (2001), http:\/\/www.jibble.org\/piespy\/ (accessed 14 October 2003)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Viegas, F.B., Donath, J.S.: Chat circles. In: CHI 1999, ACM SIGCHI, pp. 9\u201316 (1999)","DOI":"10.1145\/302979.302981"},{"key":"19_CR10","unstructured":"Krebs, V.: An introduction to social network analysis (2004), http:\/\/www.orgnet.com\/sna.html (accessed 10 February 2004)"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-44853-5_10","volume-title":"Intelligence and Security Informatics","author":"M. Magdon-Ismail","year":"2003","unstructured":"Magdon-Ismail, M., Goldberg, M., Siebecker, D., Wallace, W.: Locating hidden groups in communication networks using hidden markov models. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 126\u2013137. Springer, Heidelberg (2003)"},{"key":"19_CR12","unstructured":"Goldberg, M., Horn, P., Magdon-Ismail, M., Riposo, J., Siebecker, D., Wallace, W., Yener, B.: Statistical modeling of social groups on communication networks. In: First conference of the North American Association for Computational Social and Organizational Science (CASOS 2003), Pittsburgh PA, CASOS (2003)"},{"key":"19_CR13","volume-title":"Matrix Computations","author":"G.H. Golub","year":"1996","unstructured":"Golub, G.H., Loan, C.F.V.: Matrix Computations, 3rd edn. The Johns Hopkins University Press, Baltimore (1996)","edition":"3"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:59:45Z","timestamp":1605761985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}