{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T05:25:48Z","timestamp":1754112348039,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666155"},{"type":"electronic","value":"9789811666162"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6616-2_19","type":"book-chapter","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:03:01Z","timestamp":1650715381000},"page":"203-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Identify Twitter Data from Humans or Bots Using Machine Learning Algorithms with Kendalls Correlation"],"prefix":"10.1007","author":[{"given":"R.","family":"Sangeethapriya","sequence":"first","affiliation":[]},{"given":"J.","family":"Akilandeswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,24]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Abdulrahman, A., Mansour, A., AbdulMalik Al-Salmanb: Twitter turing test: Identifying social machines, pp. 332\u2013346 (2016)","key":"19_CR1","DOI":"10.1016\/j.ins.2016.08.036"},{"doi-asserted-by":"crossref","unstructured":"Amous Azaria,Skylur,Vadim Kagan,Aram Galstyan Kristina: The Darpa Twitter Bot Challenge, Vol 49, pp 38\u201346 (2016)","key":"19_CR2","DOI":"10.1109\/MC.2016.183"},{"doi-asserted-by":"crossref","unstructured":"Ashish Mehrotra, Mallidi Sarreddy and Sanjay Singh (2016) Detection of Fake Twitter Followers using Graph Centrality Measures in Contemporary Computing and Informatics (IC3I),2nd International Conference on. IEEE, pp. 499\u2013504.","key":"19_CR3","DOI":"10.1109\/IC3I.2016.7918016"},{"doi-asserted-by":"publisher","unstructured":"Clayton A. Davis, Onur Varol, Emilio Ferrara ,Alessandro Flammini, Filippo Menczer(2016) Bot Or Not: A System to Evaluate Social Bots, Proceedings of the 25th international conference companion on world wide web. International World Wide Web Conferences Steering Committee pp 273\u2013274. https:\/\/doi.org\/10.1145\/2872518.2889302.","key":"19_CR5","DOI":"10.1145\/2872518.2889302"},{"doi-asserted-by":"crossref","unstructured":"Christoph Besel, Juan Echeverria, Shi Zhou (2018) Full Cycle Analysis of a Large-scale Botnet Attack on Twitter In IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM) IEEE, pp 170\u2013177.","key":"19_CR6","DOI":"10.1109\/ASONAM.2018.8508708"},{"doi-asserted-by":"crossref","unstructured":"Eiman Alothali , Nazar Zaki , Elfadil A. Mohamed , and Hany Alashwal (2018) Detecting Social Bots on Twitter: A Literature Review, International conference on innovations in information technology (IIT), IEEE, pp-175\u2013180","key":"19_CR7","DOI":"10.1109\/INNOVATIONS.2018.8605995"},{"doi-asserted-by":"publisher","unstructured":"Erdem Be\u011fenilmi\u015f, Suzan Uskudarli (2018) Organized Behavior Classification of Tweet Sets using Supervised Learning Methods, In Proceedings of the 8th international conference on web intelligence, mining, and semantics. Association for Computing Ma- chinery. WIMS\u20191https:\/\/doi.org\/10.1145\/3227609.3227665","key":"19_CR8","DOI":"10.1145\/3227609.3227665"},{"doi-asserted-by":"publisher","unstructured":"Johan Fernquist and Lisa Kaati, Ralph Schroeder (2020), Political Bots and the Swedish General Election. https:\/\/doi.org\/10.1109\/ISI.2018.8587347","key":"19_CR10","DOI":"10.1109\/ISI.2018.8587347"},{"doi-asserted-by":"crossref","unstructured":"Juan Echeverr, Emiliano De Cristofaro, Nicolas Kourtellis , Ilias Leontiadis , Gianluca Stringhini , and Shi Zhou (2018) LOBO \u2013 Evaluation of Generalization Deficiencies in Twitter Bot Classifiers. In Proceedings of the 34th annual computer security applications conference pp. 137\u2013146.","key":"19_CR11","DOI":"10.1145\/3274694.3274738"},{"doi-asserted-by":"crossref","unstructured":"Majd Latah, Levent Toker (2019) Artificial intelligence enabled software-defined networking: A comprehensive Overview, Vol. 8 Issue no. 2, pp.79\u201399.","key":"19_CR12","DOI":"10.1049\/iet-net.2018.5082"},{"doi-asserted-by":"publisher","unstructured":"Mariam Orabi, Djedjiga Mouheb, Zaher Al Aghbari, Ibrahim Kamel (2020) Detection of Bots in social media: A Systematic Review, https:\/\/doi.org\/10.1016\/j.ipm.2020.102250","key":"19_CR13","DOI":"10.1016\/j.ipm.2020.102250"},{"doi-asserted-by":"publisher","unstructured":"Mohammad Alauthman, Nauman Aslam, Mouhammd Alkasassbeh, Suleman Khan, Ahmad AL-qerem, Kim-Kwang Raymond Choo (2019) An Efficient Reinforcement Learning- Based Botnet Detection approach, https:\/\/doi.org\/10.1016\/j.jnca.2019.102479","key":"19_CR14","DOI":"10.1016\/j.jnca.2019.102479"},{"doi-asserted-by":"publisher","unstructured":"Muhammad Al-Qurishi, Student Member, IEEE, M. Shamim Hossain (2018), Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks, Vol. 14, no. 2, IEEE Transactions on Industrial Informatics, pp 799\u2013813, https:\/\/doi.org\/ https:\/\/doi.org\/10.1109\/TII.2017.2753202","key":"19_CR15","DOI":"10.1109\/TII.2017.2753202"},{"doi-asserted-by":"crossref","unstructured":"Naif Radi Aljohani, Ayman Fayoumi,Saeed-Ul Hassan (2020) Bot prediction on social networks of twitter in altmetrics using deep graph convolutional networks","key":"19_CR16","DOI":"10.1007\/s00500-020-04689-y"},{"unstructured":"Phillip George Efthimion, Scott Payne, Nicholas Proferes (2018), Supervised machine learning bot detection techniques to identify social twitter bots, vol. 1, No. 2, Art. 5, pp1\u201370, https:\/\/scholar.smu.edu\/datasciencereview\/vol1\/iss2\/5","key":"19_CR17"},{"doi-asserted-by":"publisher","unstructured":"Battur, R., Yaligar, N.: Twitter bot detection using machine learning algorithms. Vol. 8, Issue 7, pp. 304\u2013307 (2018).  https:\/\/doi.org\/10.17148\/IJARCCE.2021.10417","key":"19_CR18","DOI":"10.17148\/IJARCCE.2021.10417"},{"doi-asserted-by":"publisher","unstructured":"Oentaryo, R.J., Murdopo, A., Prasetyo, P.K., Lim, E.P.: On Profiling Bots in social media. In: International conference on social informatics, pp 92\u2013109 (2016), https:\/\/doi.org\/10.1007\/978-3-319-47880-7_6","key":"19_CR19","DOI":"10.1007\/978-3-319-47880-7_6"},{"unstructured":"Shamsul, H., Yashwant, S.: Botnet detection using machine learning. In:  5th IEEE International Conference on Parallel, Distributed and Grid Computing, pp.240\u2013245 (2019)","key":"19_CR20"},{"doi-asserted-by":"publisher","unstructured":"Hoang, X.D., Nguyen, Q.C.: Botnet Detection Based on Machine Learning Techniques Using DNS Query Data, pp 1\u201311 (2018). https:\/\/doi.org\/10.3390\/fi10050043.","key":"19_CR21","DOI":"10.3390\/fi10050043"}],"container-title":["Smart Innovation, Systems and Technologies","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6616-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:11:55Z","timestamp":1650715915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6616-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666155","9789811666162"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6616-2_19","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}