{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:35:17Z","timestamp":1743032117733,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_12","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T10:07:57Z","timestamp":1548324477000},"page":"157-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets"],"prefix":"10.1007","author":[{"given":"El-Sayed M.","family":"El-Alfy","sequence":"first","affiliation":[]},{"given":"Sadam","family":"Al-Azani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Alberto, T.C., Lochter, J.V., Almeida, T.A.: Tubespam: comment spam filtering on Youtube. In: 14th IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 138\u2013143 (2015)","DOI":"10.1109\/ICMLA.2015.37"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-28940-3_10","volume-title":"Information Retrieval Technology","author":"H Almerekhi","year":"2015","unstructured":"Almerekhi, H., Elsayed, T.: Detecting automatically-generated Arabic tweets. In: Zuccon, G., Geva, S., Joho, H., Scholer, F., Sun, A., Zhang, P. (eds.) AIRS 2015. LNCS, vol. 9460, pp. 123\u2013134. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28940-3_10"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1007730.1007735","volume":"6","author":"GE Batista","year":"2004","unstructured":"Batista, G.E., Prati, R.C., Monard, M.C.: A study of the behavior of several methods for balancing machine learning training data. ACM SIGKDD Explor. Newslett. 6(1), 20\u201329 (2004)","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"12_CR4","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1016\/j.asej.2017.04.007","volume":"9","author":"Naaima Boudad","year":"2018","unstructured":"Boudad, N., Faizi, R., Thami, R.O.H., Chiheb, R.: Sentiment analysis in Arabic: a review of the literature. Ain Shams Eng. J. 9(4), 2479\u20132490 (2018). https:\/\/doi.org\/10.1016\/j.asej.2017.04.007","journal-title":"Ain Shams Engineering Journal"},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhang, J., Chen, X., Xiang, Y., Zhou, W.: 6 million spam tweets: a large ground truth for timely twitter spam detection. In: IEEE International Conference on Communications (ICC), pp. 7065\u20137070 (2015)","DOI":"10.1109\/ICC.2015.7249453"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"El-Mawass, N., Alaboodi, S.: Detecting Arabic spammers and content polluters on twitter. In: Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 53\u201358 (2016)","DOI":"10.1109\/ICDIPC.2016.7470791"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 27\u201337. ACM (2010)","DOI":"10.1145\/1866307.1866311"},{"issue":"9","key":"12_CR11","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He, H., et al.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21(9), 1263\u20131284 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"12_CR12","first-page":"29","volume":"8","author":"AT Kabakus","year":"2017","unstructured":"Kabakus, A.T., Kara, R.: A survey of spam detection methods on Twitter. Int. J. Adv. Comput. Sci. Appl. 8(3), 29\u201338 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"1","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00416ED1V01Y201204HLT016","volume":"5","author":"B Liu","year":"2012","unstructured":"Liu, B.: Sentiment analysis and opinion mining. Synth. Lect. Hum. Lang. Technol. 5(1), 1\u2013167 (2012)","journal-title":"Synth. Lect. Hum. Lang. Technol."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Mataoui, M., Zelmati, O., Boughaci, D., Chaouche, M., Lagoug, F.: A proposed spam detection approach for Arabic social networks content. In: IEEE International Conference on Mathematics and Information Technology (ICMIT), pp. 222\u2013226 (2017)","DOI":"10.1109\/MATHIT.2017.8259721"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Platt, J., et al.: Fast training of support vector machines using sequential minimal optimization. In: Advances in Kernel Methods Support Vector Learning, vol. 3 (1999)","DOI":"10.7551\/mitpress\/1130.003.0016"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Rajdev, M., Lee, K.: Fake and spam messages: detecting misinformation during natural disasters on social media. In: IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), vol. 1, pp. 17\u201320 (2015)","DOI":"10.1109\/WI-IAT.2015.102"},{"issue":"1","key":"12_CR17","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2015.2482465","volume":"11","author":"X Ruan","year":"2016","unstructured":"Ruan, X., Wu, Z., Wang, H., Jajodia, S.: Profiling online social behaviors for compromised account detection. IEEE Trans. Inf. Forensics Secur. 11(1), 176\u2013187 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-642-23644-0_16","volume-title":"Recent Advances in Intrusion Detection","author":"J Song","year":"2011","unstructured":"Song, J., Lee, S., Kim, J.: Spam filtering in Twitter using sender-receiver relationship. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 301\u2013317. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23644-0_16"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-642-13739-6_25","volume-title":"Data and Applications Security and Privacy XXIV","author":"AH Wang","year":"2010","unstructured":"Wang, A.H.: Detecting spam bots in online social networking sites: a machine learning approach. In: Foresti, S., Jajodia, S. (eds.) DBSec 2010. LNCS, vol. 6166, pp. 335\u2013342. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13739-6_25"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Wang, D., Irani, D., Pu, C.: A social-spam detection framework. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp. 46\u201354. ACM (2011)","DOI":"10.1145\/2030376.2030382"},{"key":"12_CR21","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"IH Witten","year":"2016","unstructured":"Witten, I.H., Frank, E., Hall, M.A., Pal, C.J.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, Los Altos (2016)"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T04:18:00Z","timestamp":1694578680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}