{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T12:45:14Z","timestamp":1773319514530,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642137389","type":"print"},{"value":"9783642137396","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_25","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"335-342","source":"Crossref","is-referenced-by-count":129,"title":["Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach"],"prefix":"10.1007","author":[{"given":"Alex Hai","family":"Wang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Opera: State of the mobile web, http:\/\/www.opera.com\/smw\/2009\/12\/"},{"key":"25_CR2","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayesian approach to filtering junk e-mail. In: AAAI Workshop on Learning for Text Categorization (1998)"},{"issue":"1","key":"25_CR3","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/383034.383035","volume":"1","author":"A. Arasu","year":"2001","unstructured":"Arasu, A., Cho, J., Garcia-Molina, H., Paepcke, A., Raghavan, S.: Searching the web. ACM Trans. Internet Technol.\u00a01(1), 2\u201343 (2001)","journal-title":"ACM Trans. Internet Technol."},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with trustrank. In: Proceedings of the Thirtieth international conference on Very large data bases, pp. 576\u2013587 (2004)","DOI":"10.1016\/B978-012088469-8.50052-8"},{"key":"25_CR5","unstructured":"Gyongyi, Z., Berkhin, P., Garcia-Molina, H., Pedersen, J.: Link spam detection based on mass estimation. In: VLDB 2006: Proceedings of the 32nd international conference on Very large data bases, pp. 439\u2013450 (2006)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Zhou, D., Burges, C.J.C., Tao, T.: Transductive link spam detection. In: Proceedings of the 3rd international workshop on Adversarial information retrieval on the web, pp. 21\u201328 (2007)","DOI":"10.1145\/1244408.1244413"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F.: Know your neighbors: web spam detection using the web topology. In: Proceedings of the 30th annual international ACM SIGIR conference, pp. 423\u2013430 (2007)","DOI":"10.1145\/1277741.1277814"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Geng, G.G., Li, Q., Zhang, X.: Link based small sample learning for web spam detection. In: Proceedings of the 18th international conference on World wide web, pp. 1185\u20131186 (2009)","DOI":"10.1145\/1526709.1526920"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Wu, Y.-S., Bagchi, S., Singh, N., Wita, R.: Spam detection in voice-over-ip calls through semi-supervised clustering. In: Proceedings of the 2009 Dependable Systems Networks, pp. 307\u2013316 (2009)","DOI":"10.1109\/DSN.2009.5270323"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Gon\u00e7alves, M.: Detecting spammers and content promoters in online video social networks. In: Proceedings of the 32nd international ACM SIGIR conference, pp. 620\u2013627 (2009)","DOI":"10.1145\/1571941.1572047"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Gill, P., Arlitt, M.: A few chirps about twitter. In: WOSP 2008: Proceedings of the first workshop on Online social networks, pp. 19\u201324 (2008)","DOI":"10.1145\/1397735.1397741"},{"key":"25_CR12","unstructured":"Inc. Pear Analytics: Twitter study, http:\/\/www.pearanalytics.com\/wp-content\/uploads\/2009\/08\/Twitter-Study-August-2009.pdf"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:34Z","timestamp":1606185754000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}