{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:44:00Z","timestamp":1757454240293},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662450482"},{"type":"electronic","value":"9783662450499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45049-9_85","type":"book-chapter","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T06:07:14Z","timestamp":1411106834000},"page":"525-530","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Bots in Follower Markets"],"prefix":"10.1007","author":[{"given":"Wu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Guozhong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guowei","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Liangyi","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jiguang","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Yaxue","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"85_CR1","doi-asserted-by":"crossref","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., Gummadi, P.K.: Measuring User Influence in Twitter: The Million Follower Fallacy. In: ICWSM, vol.\u00a010, pp. 10\u201317 (2010)","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"85_CR2","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Wang, G., Egele, M., Kruegel, C., Vigna, G., Zheng, H., Zhao, B.Y.: Follow the Green: Growth and Dynamics In Twitter Follower Markets. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 163\u2013176. ACM (2013)","DOI":"10.1145\/2504730.2504731"},{"key":"85_CR3","unstructured":"Wang, A.H.: Don\u2019t Follow Me: Spam Detection in Twitter. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1\u201310. IEEE (2010)"},{"key":"85_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-642-13739-6_25","volume-title":"Data and Applications Security and Privacy XXIV","author":"D. Lea","year":"2010","unstructured":"Lea, D.: Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol.\u00a06166, pp. 335\u2013342. Springer, Heidelberg (2010)"},{"issue":"8","key":"85_CR5","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C. Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. IEEE Transactions on Information Forensics and Security\u00a08(8), 1280\u20131293 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"85_CR6","doi-asserted-by":"crossref","unstructured":"Han, J.S., Park, B.J.: Efficient Detection of Content Polluters in Social Networks. In: IT Convergence and Security 2012, pp. 991\u2013996 (2013)","DOI":"10.1007\/978-94-007-5860-5_119"},{"key":"85_CR7","doi-asserted-by":"crossref","unstructured":"Miller, Z., Dickinson, B., Deitrick, W., Hu, W., Wang, A.H.: Twitter Spammer Detection Using Data Stream Clustering. Inform. Sciences (2013)","DOI":"10.1016\/j.ins.2013.11.016"},{"issue":"6","key":"85_CR8","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z. Chu","year":"2012","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE Transactions on Dependable and Secure Computing\u00a09(6), 811\u2013824 (2012)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"85_CR9","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Egele, M., Kruegel, C., Vigna, G.: Poultry Markets: on the Underground Economy of Twitter Followers. In: Proceedings of the 2012 ACM Workshop on Online Social Networks, pp. 1\u20136. ACM (2012)","DOI":"10.1145\/2342549.2342551"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing - Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45049-9_85","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T13:16:18Z","timestamp":1689513378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45049-9_85"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662450482","9783662450499"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45049-9_85","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}