{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T01:33:31Z","timestamp":1771983211852,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642236433","type":"print"},{"value":"9783642236440","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23644-0_16","type":"book-chapter","created":{"date-parts":[[2012,2,11]],"date-time":"2012-02-11T05:06:20Z","timestamp":1328936780000},"page":"301-317","source":"Crossref","is-referenced-by-count":149,"title":["Spam Filtering in Twitter Using Sender-Receiver Relationship"],"prefix":"10.1007","author":[{"given":"Jonghyuk","family":"Song","sequence":"first","affiliation":[]},{"given":"Sangho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Alexa: Top sites in united states (2011), http:\/\/www.alexa.com\/topsites\/countries\/US"},{"key":"16_CR2","unstructured":"NielsenWire: Twitter\u2019s tweet smell of success (2009), http:\/\/blog.nielsen.com\/nielsenwire\/online_mobile\/twitters-tweet-smell-of-success\/"},{"key":"16_CR3","unstructured":"TwitterBlog: #numbers (2011), http:\/\/blog.twitter.com\/2011\/03\/numbers.html"},{"key":"16_CR4","unstructured":"Webb, S., Caverlee, J., Pu, C.: Social honeypots: Making friends with a spammer near you. In: Proceedigns of the Fifth Conference on Email and Anti-Spam, CEAS (2008)"},{"key":"16_CR5","volume-title":"Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retreival","author":"K. Lee","year":"2010","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: Social honeypots + machine learning. In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retreival. ACM, New York (2010)"},{"key":"16_CR6","volume-title":"Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC)","author":"G. Stringhini","year":"2010","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC). ACM, New York (2010)"},{"key":"16_CR7","volume-title":"Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb)","author":"B. Markines","year":"2009","unstructured":"Markines, B., Cattuto, C., Menczer, F.: Social spam detection. In: Proceedings of the 5th International Workshop on Adversarial Information Retrieval on the Web (AIRWeb). ACM, New York (2009)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Yardi, S., Romero, D.: Detecting spam in a twitter network. First Monday\u00a015(1) (2010)","DOI":"10.5210\/fm.v15i1.2793"},{"key":"16_CR9","unstructured":"Gayo-Avello, D., Brenes, D.J.: Overcoming spammers in twitter - a tale of five algorithms. In: 1st Spanish Conference on Information Retrieval (2010)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Wang, A.H.: Don\u2019t follow me: Spam detection in twitter. In: Proceedings of 5th International Conference on Security and Cryptography (SECRYPT), pp. 142\u2013151 (2010)","DOI":"10.5220\/0002996201420151"},{"key":"16_CR11","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Proceedings of the 7th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS (2010)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Who is tweeting on twitter: Human, bot, or cyborg?. In: Proceedings of Annual Computer Security Applications Conference, ACSAC (2010)","DOI":"10.1145\/1920261.1920265"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: Proceedings of the IEEE Symposium on Security and Privacy (2011)","DOI":"10.1109\/SP.2011.25"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10462-009-9109-6","volume":"29","author":"E. Blanzieri","year":"2008","unstructured":"Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev.\u00a029, 63\u201392 (2008)","journal-title":"Artif. Intell. Rev."},{"key":"16_CR15","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A bayseian approach to filtering junk e-mail. In: Learning for Text Categorization: Papers from the 1998 Workshop. AAAI Technical Report, AAAI Technical Report WS-98-05 (1998)"},{"key":"16_CR16","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security","author":"C. Grier","year":"2010","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM, New York (2010)"},{"key":"16_CR17","unstructured":"TwitterHelpCenter: How to report spam on twitter, http:\/\/support.twitter.com\/articles\/64986-how-to-report-spam-on-twitter"},{"key":"16_CR18","unstructured":"TwitterBlog: State of twitter spam (2010), http:\/\/blog.twitter.com\/2010\/03\/state-of-twitter-spam.html"},{"key":"16_CR19","unstructured":"TwitterBlog: Measuring tweets (2010), http:\/\/blog.twitter.com\/2010\/02\/measuring-tweets.html"},{"key":"16_CR20","volume-title":"Proceedings of ACM SIGCOMM Conference, SIGCOMM 2006","author":"H. Yu","year":"2006","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of ACM SIGCOMM Conference, SIGCOMM 2006. ACM, New York (2006)"},{"key":"16_CR21","volume-title":"Proceedings of the 2008 IEEE Symposium on Security and Privacy","author":"H. Yu","year":"2008","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos (2008)"},{"key":"16_CR22","volume-title":"WWW 2010: Proceedings of the 19th International Conference on World Wide Web","author":"H. Kwak","year":"2010","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: WWW 2010: Proceedings of the 19th International Conference on World Wide Web. ACM, New York (2010)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Menger, K.: Zur allgemeinen kurventheorie. Inventiones Mathematicae\u00a010 (1927)","DOI":"10.4064\/fm-10-1-96-115"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Aharoni, R., Berger, E.: Menger\u2019s theorem for infinite graphs. Inventiones Mathematicae\u00a0176(1) (2009)","DOI":"10.1007\/s00222-008-0157-3"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Langville, A.N., Meyer, C.D.: A survey of eigenvector methods for web information retrieval. SIAM Review\u00a047(1) (2005)","DOI":"10.1137\/S0036144503424786"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Perron, O.: Zur theorie der matrices. Mathematicsche Annalen\u00a064(2) (1907)","DOI":"10.1007\/BF01449896"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Keener, J.: The perron\u2013frobenius theorem and the ranking of football teams. SIAM Review\u00a035(1) (1993)","DOI":"10.1137\/1035004"},{"key":"16_CR28","unstructured":"TwitterAPIwiki: Rate limiting, http:\/\/dev.twitter.com\/pages\/rate-limiting"},{"key":"16_CR29","unstructured":"Paul, R.: Twitter tells third-party devs to stop making twitter client apps (2011), http:\/\/arstechnica.com\/software\/news\/2011\/03\/twitter-tells-third-party-devs-to-stop-making-twitter-client-apps.ars"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: An update. SIGKDD Explorations\u00a011(1) (2009), http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/","DOI":"10.1145\/1656274.1656278"},{"key":"16_CR31","volume-title":"Proceedings of the 15th International Conference on World Wide Web, WWW 2006","author":"A. Ntoulas","year":"2006","unstructured":"Ntoulas, A., Najork, M., Manasse, M., Fetterly, D.: Detecting spam web pages through content analysis. In: Proceedings of the 15th International Conference on World Wide Web, WWW 2006. ACM, New York (2006)"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time url spam filtering service. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2011)","DOI":"10.1109\/SP.2011.25"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Identifying suspicious urls: an application of large-scale online learning. In: Proceedings of the 26th Annual International Conference on Machine Learning, ICML 2009 (2009)","DOI":"10.1145\/1553374.1553462"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23644-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T13:23:16Z","timestamp":1742476996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23644-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642236433","9783642236440"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23644-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}