{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:16:59Z","timestamp":1740107819116,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T00:00:00Z","timestamp":1513209600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Institute for Information & communications Technology Promotion (IITP)","award":["2017-0-00213"],"award-info":[{"award-number":["2017-0-00213"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s00500-017-2976-x","type":"journal-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T02:52:49Z","timestamp":1513219969000},"page":"6683-6691","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MTD-Spamguard: a moving target defense-based spammer detection system in social network"],"prefix":"10.1007","volume":"22","author":[{"given":"Jin Ho","family":"Park","sequence":"first","affiliation":[]},{"given":"Shailendra","family":"Rathore","sequence":"additional","affiliation":[]},{"given":"Daesung","family":"Moon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1831-0309","authenticated-orcid":false,"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,14]]},"reference":[{"key":"2976_CR1","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1016\/j.comcom.2013.04.004","volume":"36","author":"F Ahmed","year":"2013","unstructured":"Ahmed F, Abulaish M (2013) A generic statistical approach for spam detection in Online Social Networks. Comput Commun 36:1120\u20131129","journal-title":"Comput Commun"},{"doi-asserted-by":"crossref","unstructured":"Bhat SY, Abulaish M, Mirza AA (2014) Spammer classification using ensemble methods over structural social network features. In: IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), pp 454\u2013458","key":"2976_CR2","DOI":"10.1109\/WI-IAT.2014.133"},{"key":"2976_CR3","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1631\/FITEE.1601321","volume":"17","author":"GL Cai","year":"2016","unstructured":"Cai GL, Wang BS, Hu W, Wang TZ (2016) Moving target defense: state of the art and characteristics. Front Inf Technol Electron Eng 17:1122\u20131153","journal-title":"Front Inf Technol Electron Eng"},{"key":"2976_CR4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1961189.1961199","volume":"2","author":"CC Chang","year":"2011","unstructured":"Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol 2:27\u201354","journal-title":"ACM Trans Intell Syst Technol"},{"unstructured":"Chio C, Freeman D (2017) Machine Learning and Security. O\u2019Reilly Media, Inc., Sebastopol, CA","key":"2976_CR5"},{"unstructured":"Class JRIP http:\/\/weka.sourceforge.net\/doc.stable\/weka\/classifiers\/rules\/JRip.html","key":"2976_CR6"},{"key":"2976_CR7","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2015) Fame for sale: efficient detection of fake Twitter followers. Decis Support Syst 80:56\u201371","journal-title":"Decis Support Syst"},{"key":"2976_CR8","doi-asserted-by":"crossref","first-page":"3237","DOI":"10.1007\/s00500-014-1479-2","volume":"19","author":"NOF Elssied","year":"2015","unstructured":"Elssied NOF, Ibrahim O, Osman AH (2015) Enhancement of spam detection mechanism based on hybrid $$\\backslash $$ \\ varvec k-mean clustering and support vector machine. Soft Comput 19:3237\u20133248","journal-title":"Soft Comput"},{"key":"2976_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00500-017-2531-9","volume":"21","author":"K Hans","year":"2017","unstructured":"Hans K, Ahuja L, Muttoo SK (2017) Detecting redirection spam using multilayer perceptron neural network. Soft Comput 21:1\u201312","journal-title":"Soft Comput"},{"key":"2976_CR10","doi-asserted-by":"crossref","first-page":"2944","DOI":"10.1109\/TPDS.2013.309","volume":"25","author":"F Hao","year":"2014","unstructured":"Hao F, Min G, Lin M, Luo C, Yang LT (2014) MobiFuzzyTrust: an efficient fuzzy trust inference mechanism in mobile social networks. IEEE Trans Parallel Distrib Syst 25:2944\u20132955","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2976_CR11","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.neucom.2015.10.141","volume":"209","author":"F Hao","year":"2016","unstructured":"Hao F, Park DS, Min G, Jeong YS, Park JH (2016) k-Cliques mining in dynamic social networks based on triadic formal concept analysis. Neurocomputing 209:57\u201366","journal-title":"Neurocomputing"},{"key":"2976_CR12","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/JSYST.2015.2433294","volume":"11","author":"F Hao","year":"2017","unstructured":"Hao F, Min G, Pei Z, Park DS, Yang LT (2017) $ K $-Clique community detection in social networks based on formal concept analysis. IEEE Syst J 11:250\u2013259","journal-title":"IEEE Syst J"},{"unstructured":"Kincaid J (2010) EdgeRank: the secret sauce that makes Facebook\u2019s news feed tick, TechCrunch report","key":"2976_CR13"},{"key":"2976_CR14","doi-asserted-by":"crossref","first-page":"191","DOI":"10.2307\/2347628","volume":"1","author":"S Cessie Le","year":"1992","unstructured":"Le Cessie S, Van Houwelingen JC (1992) Ridge estimators in logistic regression. Appl Stat 1:191\u2013201","journal-title":"Appl Stat"},{"key":"2976_CR15","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw A, Wiener M (2002) Classification and regression by randomForest. R News 2:18\u201322","journal-title":"R News"},{"key":"2976_CR16","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.inffus.2004.04.001","volume":"6","author":"P Melville","year":"2005","unstructured":"Melville P, Mooney RJ (2005) Creating diversity in ensembles using artificial data. Inf Fusion 6:99\u2013111","journal-title":"Inf Fusion"},{"unstructured":"Moosavi-Dezfooli SM, Fawzi A, Fawzi O, Frossard P (2016) Universal adversarial perturbations. arXiv preprint arXiv:1610.08401","key":"2976_CR17"},{"unstructured":"Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008) Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems, International Foundation for Autonomous Agents and Multiagent Systems, pp 895\u2013902","key":"2976_CR18"},{"key":"2976_CR19","doi-asserted-by":"crossref","first-page":"1883","DOI":"10.4249\/scholarpedia.1883","volume":"4","author":"LE Peterson","year":"2009","unstructured":"Peterson LE (2009) K-nearest neighbor. Scholarpedia 4:1883\u20131897","journal-title":"Scholarpedia"},{"key":"2976_CR20","first-page":"1505","volume":"25","author":"M Qin","year":"2014","unstructured":"Qin M, Ke YANG (2014) Overview of web spammer detection. J Softw 25:1505\u20131526","journal-title":"J Softw"},{"unstructured":"Quinlan JR (1993) C4. 5: programming for machine learning. Morgan Kauffmann 38. San Francisco, CA","key":"2976_CR21"},{"key":"2976_CR22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.ins.2017.08.063","volume":"421","author":"S Rathore","year":"2017","unstructured":"Rathore S, Sharma PK, Loia V, Jeong YS, Park JH (2017) Social network security: issues, challenges, threats, and solutions. Inf Sci 421:43\u201369","journal-title":"Inf Sci"},{"key":"2976_CR23","first-page":"1014","volume":"13","author":"S Rathore","year":"2017","unstructured":"Rathore S, Sharma PK, Park JH (2017) XSS Classifier: an efficient XSS attack detection approach based on machine learning classifier on SNSs. J Inf Process Syst 13:1014\u20131028","journal-title":"J Inf Process Syst"},{"key":"2976_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.09.032","author":"S Rathore","year":"2017","unstructured":"Rathore S, Loia V, Park JH (2017) SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on facebook. Appl Soft Comput. https:\/\/doi.org\/10.1016\/j.asoc.2017.09.032","journal-title":"Appl Soft Comput"},{"unstructured":"Rish I (2001) An empirical study of the naive Bayes classifier. In: Proceedings of the IJCAI 2001 workshop on empirical methods in artificial intelligence, pp 41\u201346","key":"2976_CR25"},{"key":"2976_CR26","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s00500-015-1959-z","volume":"21","author":"Y Shao","year":"2017","unstructured":"Shao Y, Trovati M, Shi Q, Angelopoulou O, Asimakopoulou E, Bessis N (2017) A hybrid spam detection method based on unstructured datasets. Soft Comput 21:233\u2013243","journal-title":"Soft Comput"},{"doi-asserted-by":"publisher","unstructured":"Sharma PK, Rathore S, Park JH (2017) Multilevel learning based modeling for link prediction and users\u2019 consumption preference in Online Social Networks. Future Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2017.08.031","key":"2976_CR27","DOI":"10.1016\/j.future.2017.08.031"},{"doi-asserted-by":"publisher","unstructured":"Singh J, Singh G, Singh R (2017) Optimization of sentiment analysis using machine learning classifiers. Human-centric Comput Inf Sci. https:\/\/doi.org\/10.1186\/s13673-017-0116-3","key":"2976_CR28","DOI":"10.1186\/s13673-017-0116-3"},{"unstructured":"Statista (2017) Number of social media users worldwide from 2010 to 2021 (in billions). https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/","key":"2976_CR29"},{"doi-asserted-by":"crossref","unstructured":"Taguinod M, Doup\u00e9 A, Zhao Z, Ahn GJ (2015) Toward a moving target defense for web applications. In: Proceedings of the IEEE international conference on information reuse and integration (IRI), pp 510\u2013517","key":"2976_CR30","DOI":"10.1109\/IRI.2015.84"},{"unstructured":"Tech Crunchies (2016) Growth of social media spam statistics. http:\/\/techcrunchies.com\/growth-of-social-media-spam-statistics\/","key":"2976_CR31"},{"unstructured":"Twitter (2016) The Twitter rules, Technical report. https:\/\/support.twitter.com\/articles\/18311","key":"2976_CR32"},{"doi-asserted-by":"crossref","unstructured":"Venkatesan S, Albanese M, Amin K, Jajodia S, Wright M (2016) A moving target defense approach to mitigate DDoS attacks against proxy-based architectures In: Proceedings of the IEEE conference on communications and network security, pp 198\u2013206","key":"2976_CR33","DOI":"10.1109\/CNS.2016.7860486"},{"doi-asserted-by":"crossref","unstructured":"Vikram S, Yang C, Gu G (2013) Nomad: towards non-intrusive moving-target defense against web bots. In: Proceedings of the IEEE conference on communications and network security (CNS), pp 55\u201363","key":"2976_CR34","DOI":"10.1109\/CNS.2013.6682692"},{"unstructured":"Vorobeychik Y, Li B (2014) Optimal randomized classification in adversarial settings. In: Proceedings of the international conference on Autonomous agents and multi-agent systems, International Foundation for Autonomous Agents and Multiagent Systems, pp 485\u2013492","key":"2976_CR35"},{"key":"2976_CR36","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.neucom.2015.02.047","volume":"159","author":"X Zheng","year":"2015","unstructured":"Zheng X, Zeng Z, Chen Z, Yu Y, Rong C (2015) Detecting spammers on social networks. Neurocomputing 159:27\u201334","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Zhuang R, DeLoach SA, Ou X (2014) Towards a theory of moving target defense. In: Proceedings of the first ACM workshop on moving target defense, pp 31\u201340","key":"2976_CR37","DOI":"10.1145\/2663474.2663479"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2976-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2976-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2976-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T20:40:19Z","timestamp":1570480819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2976-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,14]]},"references-count":37,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["2976"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2976-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,12,14]]}}}