{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:34:06Z","timestamp":1774600446917,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642192593","type":"print"},{"value":"9783642192609","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19260-9_11","type":"book-chapter","created":{"date-parts":[[2011,3,11]],"date-time":"2011-03-11T05:56:55Z","timestamp":1299823015000},"page":"102-111","source":"Crossref","is-referenced-by-count":55,"title":["Detecting and Analyzing Automated Activity on Twitter"],"prefix":"10.1007","author":[{"given":"Chao Michael","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Dr. Phil (DrPhil) on Twitter (2010), \n                  \n                    http:\/\/twitter.com\/DrPhil"},{"key":"11_CR2","unstructured":"OAuth FAQ 2010, \n                  \n                    http:\/\/apiwiki.twitter.com\/OAuth-FAQ"},{"key":"11_CR3","unstructured":"TweetDeck (2010), \n                  \n                    http:\/\/www.tweetdeck.com\/"},{"key":"11_CR4","unstructured":"UberTwitter (2010), \n                  \n                    http:\/\/www.ubertwitter.com\/"},{"key":"11_CR5","unstructured":"Chowdhury, A.: State of Twitter Spam (2010), \n                  \n                    http:\/\/blog.twitter.com\/2010\/03\/state-of-twitter-spam.html"},{"key":"11_CR6","volume-title":"Goodness-of-Fit Techniques","year":"1986","unstructured":"D\u2019Agostino, R.B., Stephens, M.A. (eds.): Goodness-of-Fit Techniques. Marcel Dekker Inc., New York (1986)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: The Underground on 140 Characters or Less. In: Proc. ACM CCS (2010)","DOI":"10.1145\/1866307.1866311"},{"key":"11_CR8","unstructured":"Harvey, D.: Trust And Safety (2009), \n                  \n                    http:\/\/blog.twitter.com\/2010\/03\/trust-and-safety.html"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Huberman, B.A., Romero, D.M., Wu, F.: Social networks that matter: Twitter under the microscope. Technical report, Social Coputing Laboratory, HP Labs (2008)","DOI":"10.2139\/ssrn.1313405"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-00528-2_7","volume-title":"Advances in Web Mining and Web Usage Analysis","author":"A. Java","year":"2009","unstructured":"Java, A., Song, X., Finin, T., Tseng, B.: Why We Twitter: An Analysis of a Microblogging Community. In: Zhang, H., Spiliopoulou, M., Mobasher, B., Giles, C.L., McCallum, A., Nasraoui, O., Srivastava, J., Yen, J. (eds.) WebKDD 2007. LNCS, vol.\u00a05439, pp. 118\u2013138. Springer, Heidelberg (2009)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Gill, P., Arlitt, M.: A few chirps about Twitter. In: Proc. ACM SIGCOMM Workshop on Online Social Networks (2008)","DOI":"10.1145\/1397735.1397741"},{"key":"11_CR12","unstructured":"Media, I.: HootSuite (2010), \n                  \n                    http:\/\/hootsuite.com\/"},{"key":"11_CR13","unstructured":"Miller, C.: Twitter Makes Itself More Useful (2010), \n                  \n                    http:\/\/bits.blogs.nytimes.com\/2010\/04\/14\/twitter-makes-itself-more-useful\/"},{"key":"11_CR14","unstructured":"naan studio. Echofon (2010), \n                  \n                    http:\/\/www.echofon.com\/"},{"key":"11_CR15","unstructured":"Sysomos. Inside Twitter: An In-Depth Look at the 5% of Most Active Users (2009), \n                  \n                    http:\/\/sysomos.com\/insidetwitter\/mostactiveusers"},{"key":"11_CR16","unstructured":"TwitterCounter.com. The 1000 most popular Twitter users (2010), \n                  \n                    http:\/\/twittercounter.com\/pages\/100\/"},{"key":"11_CR17","unstructured":"Zetter, K.: Trick or Tweet? Malware Abundant in Twitter URLs (2009), \n                  \n                    http:\/\/www.wired.com\/threatlevel\/2009\/10\/twitter_malware\/"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19260-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T10:35:26Z","timestamp":1558434926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19260-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192593","9783642192609"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19260-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}