{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:58:24Z","timestamp":1725454704967},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387883"},{"type":"electronic","value":"9783642387890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38789-0_14","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T13:40:19Z","timestamp":1367502019000},"page":"165-172","source":"Crossref","is-referenced-by-count":0,"title":["Understanding (Mis)Information Spreading for Improving Corporate Network Trustworthiness"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Baldoni","sequence":"first","affiliation":[]},{"given":"Silvia","family":"Bonomi","sequence":"additional","affiliation":[]},{"given":"Giuseppe Antonio","family":"Di Luna","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Montanari","sequence":"additional","affiliation":[]},{"given":"Mara","family":"Sorella","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"14_CR2","unstructured":"IBM: Smallblue research tool, \n                    \n                      http:\/\/smallblue.research.ibm.com\/"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, pp. 665\u2013674 (2011)","DOI":"10.1145\/1963405.1963499"},{"key":"14_CR4","unstructured":"http:\/\/www.isi.edu\/~adibi\/Enron\/Enron.html\n                    \n                    \n                   (access: February 20, 2013)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2001, pp. 57\u201366 (2001)","DOI":"10.1145\/502512.502525"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 137\u2013146 (2003)","DOI":"10.1145\/956755.956769"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-77105-0_31","volume-title":"Internet and Network Economics","author":"S. Bharathi","year":"2007","unstructured":"Bharathi, S., Kempe, D., Salek, M.: Competitive influence maximization in social networks. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol.\u00a04858, pp. 306\u2013311. Springer, Heidelberg (2007)"},{"key":"14_CR8","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-642-28798-5_65","volume-title":"Recent Progress in Data Engineering and Internet Technology","author":"Z.-L. Luo","year":"2012","unstructured":"Luo, Z.-L., Cai, W.-D., Li, Y.-J., Peng, D.: A pageRank-based heuristic algorithm for influence maximization in the social network. In: Gaol, F.L. (ed.) Recent Progress in DEIT, Vol. 2. LNEE, vol.\u00a0157, pp. 485\u2013490. Springer, Heidelberg (2012)"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1145\/1835804.1835934","volume-title":"Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010","author":"W. Chen","year":"2010","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, pp. 1029\u20131038. ACM, New York (2010)"},{"issue":"5","key":"14_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1317379.1317381","volume":"41","author":"A.M. Kermarrec","year":"2007","unstructured":"Kermarrec, A.M., Van Steen, M.: Gossiping in distributed systems. ACM SIGOPS Operating Systems Review\u00a041(5), 2\u20137 (2007)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"4","key":"14_CR11","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/945506.945507","volume":"21","author":"P.T. Eugster","year":"2003","unstructured":"Eugster, P.T., Guerraoui, R., Handurukande, S.B., Kouznetsov, P., Kermarrec, A.M.: Lightweight probabilistic broadcast. ACM TOCS\u00a021(4), 341\u2013374 (2003)","journal-title":"ACM TOCS"},{"key":"14_CR12","unstructured":"http:\/\/www.isi.edu\/~adibi\/Enron\/Enron_Employee_Status.xls\n                    \n                    \n                   (access: February 20, 2013)"},{"key":"14_CR13","unstructured":"http:\/\/news.findlaw.com\/hdocs\/docs\/enron\/enronbk72803app-c.pdf\n                    \n                    \n                   (access: February 20, 2013)"}],"container-title":["Lecture Notes in Computer Science","Dependable Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38789-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T15:15:57Z","timestamp":1557674157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38789-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387883","9783642387890"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38789-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}