{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:33Z","timestamp":1725771273466},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_4","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T09:26:22Z","timestamp":1391765182000},"page":"45-56","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Semantic Attacks in Online Social Networks"],"prefix":"10.1007","author":[{"given":"K. P. Krishna","family":"Kumar","sequence":"first","affiliation":[]},{"given":"G.","family":"Geethakumari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G. Adomavicius","year":"2005","unstructured":"Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering\u00a017(6), 734\u2013749 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"unstructured":"Alvarez-Hamelin, J.I., Dall\u2019Asta, L., Barrat, A., Vespignani, A.: k-core decomposition: A tool for the visualization of large scale networks. arXiv preprint cs\/0504107 (2005)","key":"4_CR2"},{"doi-asserted-by":"crossref","unstructured":"Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone\u2019s an influencer: quantifying influence on twitter. In: Proceedings of the 4th International Conference on Web Search and Data Mining, pp. 65\u201374. ACM (2011)","key":"4_CR3","DOI":"10.1145\/1935826.1935845"},{"doi-asserted-by":"crossref","unstructured":"Bastian, M., Heymann, S., Jacomy, M.: Gephi: an open source software for exploring and manipulating networks. In: International AAAI Conference on Weblogs and Social Media, pp. 361\u2013362 (2011)","key":"4_CR4","DOI":"10.1609\/icwsm.v3i1.13937"},{"doi-asserted-by":"crossref","unstructured":"Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Classification features for attack detection in collaborative recommender systems. In: Proceedings of the 12th International Conference on Knowledge Discovery and Data Mining, pp. 542\u2013547. ACM SIGKDD (2006)","key":"4_CR5","DOI":"10.1145\/1150402.1150465"},{"unstructured":"Fallis, D.: A conceptual analysis of disinformation. In: iConference. Chapel Hill, NC (2009)","key":"4_CR6"},{"unstructured":"Hawksey, M.: Twitter Archiving Google Spreadsheet TAGS v5. JISC CETIS MASHe: The Musing of Martin Hawksey (EdTech Explorer) (2013), http:\/\/mashe.hawksey.info\/2013\/02\/twitter-archive-tagsv5\/ (last accessed December 29, 2013)","key":"4_CR7"},{"issue":"1","key":"4_CR8","first-page":"1","volume":"18","author":"N.A. Karlova","year":"2013","unstructured":"Karlova, N.A., Fisher, K.E.: Plz RT: A social diffusion model of misinformation and disinformation for understanding human information behaviour. Information Research\u00a018(1), 1\u201317 (2013)","journal-title":"Information Research"},{"doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, pp. 591\u2013600. ACM (2010)","key":"4_CR9","DOI":"10.1145\/1772690.1772751"},{"unstructured":"OMahony, M.P., Hurley, N.J., Silvestre, G.C.: Attacking recommender systems: The cost of promotion. In: Proceedings of the Workshop on Recommender Systems, in Conjunction with the 17th European Conference on Artificial Intelligence, pp. 24\u201328. Citeseer (2006)","key":"4_CR10"},{"doi-asserted-by":"crossref","unstructured":"Ratkiewicz, J., Conover, M., Meiss, M., Gon\u00e7alves, B., Patil, S., Flammini, A., Menczer, F.: Truthy: mapping the spread of astroturf in microblog streams. In: Proceedings of the 20th International Conference Companion on World Wwide Web, pp. 249\u2013252. ACM (2011)","key":"4_CR11","DOI":"10.1145\/1963192.1963301"},{"doi-asserted-by":"crossref","unstructured":"Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: real-time event detection by social sensors. In: Proceedings of the 19th International Conference on World Wide Web, pp. 851\u2013860. ACM (2010)","key":"4_CR12","DOI":"10.1145\/1772690.1772777"},{"unstructured":"Solis, B.: The information divide: The socialisation of news (2010), http:\/\/www.briansolis.com\/2010\/02\/the-information-divide-the-socialization-of-news-and-dissemination\/ (last accessed December 29, 2013)","key":"4_CR13"},{"key":"4_CR14","doi-asserted-by":"crossref","first-page":"83","DOI":"10.28945\/473","volume":"9","author":"B.C. Stahl","year":"2006","unstructured":"Stahl, B.C.: On the difference or equality of information, misinformation, and disinformation: A critical research perspective. Informing Science: International Journal of an Emerging Transdiscipline\u00a09, 83\u201396 (2006)","journal-title":"Informing Science: International Journal of an Emerging Transdiscipline"},{"doi-asserted-by":"crossref","unstructured":"Starbird, K., Palen, L.: (How) will the revolution be retweeted?: Information diffusion and the 2011 Egyptian uprising. In: Proceedings of the International Conference on Computer Supported Cooperative Work, pp. 7\u201316. ACM (2012)","key":"4_CR15","DOI":"10.1145\/2145204.2145212"},{"doi-asserted-by":"crossref","unstructured":"Zhang, F.: Reverse bandwagon profile inject attack against recommender systems. In: Proceedings of the 2nd International Symposium on Computational Intelligence and Design (ISCID), pp. 15\u201318. IEEE (2009)","key":"4_CR16","DOI":"10.1109\/ISCID.2009.11"},{"doi-asserted-by":"crossref","unstructured":"Zhang, F.: Analysis of bandwagon and average hybrid attack model against trust-based recommender systems. In: Proceedinga of the 5th International Conference on Management of e-Commerce and e-Government, pp. 269\u2013273. IEEE (2011)","key":"4_CR17","DOI":"10.1109\/ICMeCG.2011.10"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T05:59:15Z","timestamp":1688968755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}