{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:13Z","timestamp":1751602273591,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811302916"},{"type":"electronic","value":"9789811302923"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-0292-3_15","type":"book-chapter","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T18:39:00Z","timestamp":1523644740000},"page":"233-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Malicious Behaviour Analysis on Twitter Through the Lens of User Interest"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6724-0365","authenticated-orcid":false,"given":"Bandar","family":"Alghamdi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1137-0272","authenticated-orcid":false,"given":"Yue","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8233-9195","authenticated-orcid":false,"given":"Jason","family":"Watson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,14]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Aggarwal, A., Rajadesingan, A., Kumaraguru, P.: PhishAri: automatic realtime phishing detection on Twitter. In: IEEE eCrime Researchers Summit, Las Croabas, Puerto Rico, p. 1 (2012). https:\/\/doi.org\/10.1109\/eCrime.2012.6489521","DOI":"10.1109\/eCrime.2012.6489521"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imieli\u0144ski, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Washington, D.C., USA, pp. 207\u2013216 (1993)","DOI":"10.1145\/170036.170072"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Alghamdi, B., Watson, J., Xu, Y.: Toward detecting malicious links in online social networks through user behavior. In: IEEE WIC\/ACM International Conference on Web Intelligence Workshops, Omaha, USA, pp. 5\u20138 (2016). https:\/\/doi.org\/10.1109\/wiw.2016.014","DOI":"10.1109\/wiw.2016.014"},{"key":"15_CR4","unstructured":"Benevenuto, F., Magno G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bhattarai, A., Rus, V., Dasgupta, D.: Characterizing comment spam in the blogosphere through content analysis. In: IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009, pp. 37\u201344 (2009)","DOI":"10.1109\/CICYBS.2009.4925088"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Cao, C., Caverlee, J.: Behavioral detection of spam URL sharing: posting patterns versus click patterns. In: International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 138\u2013141. IEEE\/ACM, Beijing (2014)","DOI":"10.1109\/ASONAM.2014.6921573"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s10618-016-0479-5","volume":"31","author":"Q Dang","year":"2016","unstructured":"Dang, Q., Zhou, Y., Gao, F., Sun, Q.: Detecting cooperative and organized spammer groups in micro-blogging community. Data Min. Knowl. Discov. 31, 573\u2013605 (2016)","journal-title":"Data Min. Knowl. Discov."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Dewan, P., Ponnurangam, K.: Towards automatic real time identification of malicious posts on Facebook. In: 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, pp. 85\u201392 (2015)","DOI":"10.1109\/PST.2015.7232958"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Eshraqi, N., Jalali, M., Moatar, H.M.: Detecting spam tweets in Twitter using a data stream clustering algorithm. In: International Congress on Technology, Communication and Knowledge (ICTCK), pp. 347\u2013351 (2015)","DOI":"10.1109\/ICTCK.2015.7582694"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Feroz, M.N., Mengel, S.: Examination of data, rule generation and detection of phishing URLs using online logistic regression. In: International Conference on Big Data, pp. 241\u2013250. IEEE, Washington, D.C. (2014)","DOI":"10.1109\/BigData.2014.7004239"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35\u201347. ACM (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Grier, C., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: ACM Conference on Computer and Communications Security, pp. 27\u201337. ACM (2010)","DOI":"10.1145\/1866307.1866311"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/B978-012088469-8.50052-8","volume-title":"Proceedings 2004 VLDB Conference","author":"Zolt\u00e1n Gy\u00f6ngyi","year":"2004","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with trustrank. In: Thirtieth International Conference on Very large Data Dases, vol. 30, pp. 576\u2013587. VLDB Endowment (2004)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"He, S., Wang, H.J., Hong, Z.: Identifying user behavior on Twitter based on multi-scale entropy. In: International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), pp. 381\u2013384. IEEE, Wuhan (2014)","DOI":"10.1109\/SPAC.2014.6982720"},{"issue":"6","key":"15_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., Garcia-Molina, H.: Fighting spam on social web sites: a survey of approaches and future challenges. IEEE Internet Comput. 11(6), 36\u201345 (2007)","journal-title":"IEEE Internet Comput."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Hua, W., Zhang, Y.: Threshold and associative based classification for social spam profile detection on Twitter. In: The Ninth International Conference on Semantics, Knowledge and Grids (SKG), pp. 113\u2013120. IEEE, Beijing (2013)","DOI":"10.1109\/SKG.2013.15"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-42996-0_12","volume-title":"Trends and Applications in Knowledge Discovery and Data Mining","author":"SY Jeong","year":"2016","unstructured":"Jeong, S.Y., Koh, Y.S., Dobbie, G.: Phishing detection on Twitter streams. In: Cao, H., Li, J., Wang, R. (eds.) PAKDD 2016. LNCS (LNAI), vol. 9794, pp. 141\u2013153. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42996-0_12"},{"issue":"3","key":"15_CR18","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s10462-007-9052-3","volume":"26","author":"SB Kotsiantis","year":"2006","unstructured":"Kotsiantis, S.B., Zaharakis, I.D., Pintelas, P.E.: Machine learning: a review of classification and combining techniques. Artif. Intell. Rev. 26(3), 159\u2013190 (2006)","journal-title":"Artif. Intell. Rev."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Ma, J.S., Savage, L.K., Voelker, S., Geoffrey, M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245\u20131254. ACM, New York (2009)","DOI":"10.1145\/1557019.1557153"},{"issue":"8","key":"15_CR20","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., Araujo, L.: Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Syst. Appl. 40(8), 2992\u20133000 (2013)","journal-title":"Expert Syst. Appl."},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-23496-5_13","volume-title":"Autonomic and Trusted Computing","author":"M McCord","year":"2011","unstructured":"McCord, M., Chuah, M.: Spam detection on Twitter using traditional classifiers. In: Calero, J.M.A., Yang, L.T., M\u00e1rmol, F.G., Garc\u00eda Villalba, L.J., Li, A.X., Wang, Y. (eds.) ATC 2011. LNCS, vol. 6906, pp. 175\u2013186. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23496-5_13"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Nepali, R.K., Wang, Y.: You look suspicious!!: leveraging visible attributes to classify malicious short URLs on Twitter. In: Hawaii International Conference on System Sciences (HICSS), pp. 2648\u20132655. IEEE (2016)","DOI":"10.1109\/HICSS.2016.332"},{"issue":"1","key":"15_CR23","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2015.2482465","volume":"11","author":"X Ruan","year":"2016","unstructured":"Ruan, X., Wu, Z., Wang, H., Jajodia, S.: Profiling online social behaviors for compromised account detection. IEEE Trans. Inf. Forensics Secur. 11(1), 176\u2013187 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2482465","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"15_CR24","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1002\/asi.23836","volume":"68","author":"S Sedhai","year":"2017","unstructured":"Sedhai, S., Sun, A.: An analysis of 14 Million tweets on hashtag-oriented spamming. J. Assoc. Inf. Sci. Technol. 68(7), 1638\u20131651 (2017)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.neucom.2016.11.013","volume":"225","author":"H Shen","year":"2017","unstructured":"Shen, H., Ma, F., Zhang, X., Zong, L., Liu, X., Liang, W.: Discovering social spammers from multiple views. Neurocomputing 225, 49\u201357 (2017)","journal-title":"Neurocomputing"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the ACM of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 1\u20139. ACM, New York (2010)","DOI":"10.1145\/1920261.1920263"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Ma, J., Paxson, V., Song, D.: Design and evaluation of a real-time URL spam filtering service. In: IEEE Symposium on Security and Privacy (SP), Berkeley, CA, pp. 447\u2013462. IEEE (2011a)","DOI":"10.1109\/SP.2011.25"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of Twitter spam. In: The 2011 ACM SIGCOMM Conference on Internet Measurement conference, New York, USA, pp. 243\u2013258. ACM (2011b)","DOI":"10.1145\/2068816.2068840"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Wang, D., Irani, D., Pu, C.: A study on evolution of email spam over fifteen years. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, (Collaboratecom), Austin, TX, pp. 1\u201310. (2013)","DOI":"10.4108\/icst.collaboratecom.2013.254082"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Wang, D., Navathe, S.B., Liu, L., Irani, D., Tamersoy, A., Pu, C.: Click traffic analysis of short URL spam on Twitter. In: International Conference Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), IEEE, pp. 250\u2013259 (2013)","DOI":"10.4108\/icst.collaboratecom.2013.254084"},{"key":"15_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","volume-title":"Recent Advances in Intrusion Detection","author":"C Yang","year":"2011","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 318\u2013337. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_17"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Zheng, L.-X., Xu, X.-L., Li, J., Zhang, L., Pan, X.-C., Ma, Z.-Y., Zhang, L.-H.: Malicious URL prediction based on community detection. In: 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/SSIC.2015.7245681"}],"container-title":["Communications in Computer and Information Science","Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-0292-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T17:28:33Z","timestamp":1751563713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-0292-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811302916","9789811302923"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-0292-3_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}