{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:44:20Z","timestamp":1759941860796},"publisher-location":"New Delhi","reference-count":18,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_43","type":"book-chapter","created":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T20:41:10Z","timestamp":1445719270000},"page":"517-526","source":"Crossref","is-referenced-by-count":3,"title":["Unsupervised Spam Detection in Hyves Using SALSA"],"prefix":"10.1007","author":[{"given":"Mohit","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"R.","family":"Leela Velusamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"issue":"6","key":"43_CR1","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.appdev.2008.07.003","volume":"29","author":"K Subrahmanyam","year":"2008","unstructured":"Subrahmanyam, K., Reich, S.M., Waechter, N., Espinoza, G.: Online and offline social networks: use of social networking sites by emerging adults. J. Appl. Dev. Psychol. 29(6), 420\u2013433 (2008)","journal-title":"J. Appl. Dev. Psychol."},{"issue":"3","key":"43_CR2","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1016\/j.chb.2010.12.009","volume":"27","author":"K-Y Lin","year":"2011","unstructured":"Lin, K.-Y., Lu, H.-P.: Why people use social networking sites: an empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152\u20131161 (2011)","journal-title":"Comput. Hum. Behav."},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Brandtzaeg, P.B., Heim, J.: Why people use social networking sites. In: Online Communities and Social Computing, pp. 143\u2013152. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-02774-1_16"},{"issue":"4","key":"43_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MITP.2007.78","volume":"9","author":"S Murugesan","year":"2007","unstructured":"Murugesan, S.: Understanding Web 2.0. IT Prof. 9(4), 34\u201341 (2007)","journal-title":"IT Prof."},{"issue":"2","key":"43_CR5","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/382979.383041","volume":"19","author":"R Lempel","year":"2001","unstructured":"Lempel, R., Moran, S.: SALSA: the stochastic approach for link-structure analysis. ACM Trans. Inf. Syst. TOIS 19(2), 131\u2013160 (2001)","journal-title":"ACM Trans. Inf. Syst. TOIS"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, P., Goel, A., Lin, J., Sharma, A., Wang, D., Zadeh, R.: Wtf: the who to follow service at twitter. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 505\u2013514 (2013)","DOI":"10.1145\/2488388.2488433"},{"key":"43_CR7","unstructured":"Cisco 2011 Annual Security Report"},{"issue":"6","key":"43_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. Internet Comput. IEEE 11(6), 36\u201345 (2007)","journal-title":"Internet Comput. IEEE"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F.: Know your neighbours: web spam detection using the web topology. In: ACM SIGIR, pp. 423\u2013430 (2007)","DOI":"10.1145\/1277741.1277814"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Zeng, Z., Zheng, X., Chen, G., Yu, Y.: Spammer detection on Weibo social network, pp. 881\u2013886 (2014)","DOI":"10.1109\/CloudCom.2014.14"},{"key":"43_CR11","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)"},{"issue":"10","key":"43_CR12","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1016\/j.patrec.2012.03.012","volume":"33","author":"D DeBarr","year":"2012","unstructured":"DeBarr, D., Wechsler, H.: Spam detection using random boost. Pattern Recognit. Lett. 33(10), 1237\u20131244 (2012)","journal-title":"Pattern Recognit. Lett."},{"issue":"6","key":"43_CR13","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TDSC.2012.75","volume":"9","author":"Z Chu","year":"2012","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., Jajodia, S.: Detecting automation of twitter accounts: are you a human, bot, or cyborg? IEEE Trans. Dependable Secure Comput. 9(6), 811\u2013824 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"10\u201311","key":"43_CR14","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1016\/j.comcom.2013.04.004","volume":"36","author":"F Ahmed","year":"2013","unstructured":"Ahmed, F., Abulaish, M.: A generic statistical approach for spam detection in online social networks. Comput. Commun. 36(10\u201311), 1120\u20131129 (2013)","journal-title":"Comput. Commun."},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Wang, K., Wang, Y., Li, H., Xiong, Y., Zhang, X.: A new approach for detecting spam microblogs based on text and user\u2019s social network features. In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems (VITAE), pp. 1\u20135 (2014)","DOI":"10.1109\/VITAE.2014.6934446"},{"key":"43_CR16","first-page":"364","volume-title":"Lecture Notes in Computer Science","author":"Maarten Bosma","year":"2012","unstructured":"Bosma, M., Meij, E., Weerkamp, W.: A framework for unsupervised spam detection in social networking sites. In: Advances in Information Retrieval, pp. 364\u2013375. Springer, Berlin (2012)"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Najork, M.A.: Comparing the effectiveness of HITS and SALSA. In: Proceedings of the Sixteenth ACM Conference on Information and Knowledge Management, pp. 157\u2013164 (2007)","DOI":"10.1145\/1321440.1321465"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Najork, M., Gollapudi, S., Panigrahy, R.: Less is more: sampling the neighborhood graph makes salsa better and faster. In: Proceedings of the Second ACM International Conference on Web Search and Data Mining, pp. 242\u2013251 (2009)","DOI":"10.1145\/1498759.1498832"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:12:52Z","timestamp":1559279572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}