{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:36:27Z","timestamp":1725672987247},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642289965"},{"type":"electronic","value":"9783642289972"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28997-2_31","type":"book-chapter","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T04:36:53Z","timestamp":1333600613000},"page":"364-375","source":"Crossref","is-referenced-by-count":22,"title":["A Framework for Unsupervised Spam Detection in Social Networking Sites"],"prefix":"10.1007","author":[{"given":"Maarten","family":"Bosma","sequence":"first","affiliation":[]},{"given":"Edgar","family":"Meij","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Weerkamp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K.: Identifying video spammers in online social networks. In: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, pp. 45\u201352. ACM (2008)","DOI":"10.1145\/1451983.1451996"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Bian, J., Liu, Y., Zhou, D., Agichtein, E., Zha, H.: Learning to recognize reliable users and content in social media with coupled mutual reinforcement. In: Proceedings of the 18th International Conference on World Wide Web, pp. 51\u201360. ACM (2009)","DOI":"10.1145\/1526709.1526717"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Campbell, C.S., Maglio, P.P., Cozzi, A., Dom, B.: Expertise identification using email communications. In: Proceedings of the Twelfth International Conference on Information and Knowledge Management, pp. 528\u2013531. ACM (2003)","DOI":"10.1145\/956958.956965"},{"key":"31_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-12079-4_10","volume-title":"Advances in Social Computing","author":"D. DeBarr","year":"2010","unstructured":"DeBarr, D., Wechsler, H.: Using Social Network Analysis for Spam Detection. In: Chai, S.-K., Salerno, J.J., Mabry, P.L. (eds.) SBP 2010. LNCS, vol.\u00a06007, pp. 62\u201369. Springer, Heidelberg (2010)"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Dom, B., Eiron, I., Cozzi, A., Zhang, Y.: Graph-based ranking algorithms for e-mail expertise analysis. In: Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pp. 42\u201348. ACM (2003)","DOI":"10.1145\/882092.882093"},{"issue":"8","key":"31_CR6","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T. Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to roc analysis. Pattern Recognition Letters\u00a027(8), 861\u2013874 (2006)","journal-title":"Pattern Recognition Letters"},{"key":"31_CR7","unstructured":"Ghiossi, C.: The facebook blog: Explaining facebook\u2019s spam prevention systems (2010), http:\/\/blog.facebook.com\/blog.php?post=403200567130 (accessed May 12, 2011)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on World Wide Web, pp. 403\u2013412. ACM (2004)","DOI":"10.1145\/988672.988727"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Irani, D., Webb, S., Pu, C.: Study of static classification of social spam profiles in myspace. In: Proceedings of the 4th International Conference on Weblogs and Social Media (2010)","DOI":"10.1609\/icwsm.v4i1.14017"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Jurczyk, P., Agichtein, E.: Discovering authorities in question answer communities by using link analysis. In: Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management, pp. 919\u2013922. ACM (2007)","DOI":"10.1145\/1321440.1321575"},{"issue":"5","key":"31_CR11","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"J.M. Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Authoritative sources in a hyperlinked environment. Journal of the ACM (JACM)\u00a046(5), 604\u2013632 (1999)","journal-title":"Journal of the ACM (JACM)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots+ machine learning. In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 435\u2013442. ACM (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Lu, Y., Tsaparas, P., Ntoulas, A., Polanyi, L.: Exploiting social context for review quality prediction. In: Proceedings of the 19th International Conference on World Wide Web, pp. 691\u2013700. ACM (2010)","DOI":"10.1145\/1772690.1772761"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 14\u201321. ACM (2007)","DOI":"10.1145\/1216295.1216307"},{"key":"31_CR15","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web. In: Stanford InfoLab. Citeseer (1999)"},{"key":"31_CR16","unstructured":"Wang, A.H.: Don\u2019t follow me: Spam detection in twitter. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1\u201310. IEEE (2010)"},{"key":"31_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1007\/978-3-540-71703-4_106","volume-title":"Advances in Databases: Concepts, Systems and Applications","author":"J. Zhang","year":"2007","unstructured":"Zhang, J., Tang, J., Li, J.: Expert Finding in a Social Network. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol.\u00a04443, pp. 1066\u20131069. Springer, Heidelberg (2007)"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE 2004, pp. 83\u201397. IEEE (2004)","DOI":"10.1109\/EEE.2004.1287293"},{"key":"31_CR19","volume-title":"Fourth Conference on Email and Anti-Spam, Mountain View","author":"A. Zinman","year":"2007","unstructured":"Zinman, A., Donath, J.: Is britney spears spam. In: Fourth Conference on Email and Anti-Spam, Mountain View. Citeseer, CA (2007)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28997-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T15:48:50Z","timestamp":1687362530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28997-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642289965","9783642289972"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28997-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}