{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:13:58Z","timestamp":1748751238037,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662490136"},{"type":"electronic","value":"9783662490143"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-49014-3_11","type":"book-chapter","created":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T14:41:36Z","timestamp":1450881696000},"page":"113-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SAMD: A System for Abnormal Messages Detection Oriented Microblog Message Stream"],"prefix":"10.1007","author":[{"given":"Guozhong","family":"Dong","sequence":"first","affiliation":[]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,24]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1504\/IJCSE.2014.060679","volume":"9","author":"KS Babu","year":"2014","unstructured":"Babu, K.S., Hota, J., Jena, S.K.: Privacy preserving social networking. Int. J. Comput. Sci. Eng. 9(3), 165\u2013176 (2014)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"4","key":"11_CR2","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1504\/IJCSE.2014.060717","volume":"9","author":"L Caviglione","year":"2014","unstructured":"Caviglione, L., Coccoli, M., Merlo, A.: A taxonomy-based model of security and privacy in online social networks. Int. J. Comput. Sci. Eng. 9(4), 325\u2013338 (2014)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1504\/IJES.2015.066140","volume":"7","author":"T Wang","year":"2015","unstructured":"Wang, T., Zhou, Z., Zhu, T., Wei, Y.: Mood disorder patients language features on their microblogs. Int. J. Embed. Syst. 7(1), 34\u201342 (2015)","journal-title":"Int. J. Embed. Syst."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Tomioka, R., Yamanishi, K.: Discovering emerging topics in social streams via link anomaly detection. In: Proceedings of IEEE 11th International Conference on Data Mining, Vancouver, pp. 1230\u20131235 (2011)","DOI":"10.1109\/ICDM.2011.53"},{"issue":"8","key":"11_CR5","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992\u20133000 (2013)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"11_CR6","doi-asserted-by":"crossref","first-page":"695","DOI":"10.23919\/CJE.2014.10851989","volume":"23","author":"G Dong","year":"2014","unstructured":"Dong, G., Li, R., Yang, W., Wang, W., Gong, L., Shen, G., Yu, M., Lv, J.: Microblog burst keywords detection based on social trust and dynamics model. Chin. J. Electron. 23(4), 695\u2013700 (2014)","journal-title":"Chin. J. Electron."},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/978-3-662-45049-9_85","volume-title":"Bio-Inspired Computing-Theories and Applications","author":"W Yang","year":"2014","unstructured":"Yang, W., Dong, G., Wang, W., Shen, G., Gong, L., Yu, M., Lv, J., Hu, Y.: Detecting bots in follower markets. In: Pan, L., P\u0103un, G., P\u00e9rez-Jim\u00e9nez, M.J., Song, T. (eds.) Bio-Inspired Computing-Theories and Applications, pp. 525\u2013553. Springer, Heidelberg (2014). vol. 472"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes Twitter users: real-time event detection by social sensors. In: Proceedings of the 19th International Conference on World Wide Web, pp. 851\u2013860 (2010)","DOI":"10.1145\/1772690.1772777"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Alvanaki, F., Michel S., Ramamritham, K., Weikum, G.: EnBlogue: emergent topic detection in web 2.0 streams. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, pp. 1271\u20131274 (2011)","DOI":"10.1145\/1989323.1989473"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Li, C., Sun, A., Datta, A.: Twevent: segment-based event detection from tweets. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 155\u2013164 (2012)","DOI":"10.1145\/2396761.2396785"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Lee, P., Lakshmanan, L.V.S., Milios, E.: KeySee: supporting keyword search on evolving events in social streams. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1478\u20131481 (2013)","DOI":"10.1145\/2487575.2487711"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Y., Liu, H., Lin, H., Wu, J., Wu, Z., Cao, J.: SEA: a system for event analysis on chinese tweets. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1498\u20131501 (2013)","DOI":"10.1145\/2487575.2487719"},{"issue":"13","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14778\/2733004.2733049","volume":"7","author":"R Xie","year":"2014","unstructured":"Xie, R., Zhu, F., Ma, H., Xie, W., Lin, C.: CLEar: a real-time online observatory for bursty and viral events. Proc. VLDB Endowment 7(13), 1\u20134 (2014)","journal-title":"Proc. VLDB Endowment"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Ren, D., Zhang, X., Wang, Z.H., Li, J., Yuan, X.: WeiboEvents: a crowd sourcing Weibo visual analytic system. In: Proceedings of IEEE Pacific Visualization Symposium, pp. 330\u2013334 (2014)","DOI":"10.1109\/PacificVis.2014.38"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing -- Theories and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49014-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T22:39:23Z","timestamp":1748731163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49014-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662490136","9783662490143"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49014-3_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}