{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:50:11Z","timestamp":1760709011657},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,2,20]],"date-time":"2016-02-20T00:00:00Z","timestamp":1455926400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s10207-016-0321-5","type":"journal-article","created":{"date-parts":[[2016,2,20]],"date-time":"2016-02-20T05:34:16Z","timestamp":1455946456000},"page":"475-491","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts"],"prefix":"10.1007","volume":"15","author":[{"given":"Abdullah","family":"Almaatouq","sequence":"first","affiliation":[]},{"given":"Erez","family":"Shmueli","sequence":"additional","affiliation":[]},{"given":"Mariam","family":"Nouh","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Alabdulkareem","sequence":"additional","affiliation":[]},{"given":"Vivek K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Mansour","family":"Alsaleh","sequence":"additional","affiliation":[]},{"given":"Abdulrahman","family":"Alarifi","sequence":"additional","affiliation":[]},{"given":"Anas","family":"Alfaris","sequence":"additional","affiliation":[]},{"given":"Alex \u2018Sandy\u2019","family":"Pentland","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,20]]},"reference":[{"key":"321_CR1","doi-asserted-by":"publisher","unstructured":"Almaatouq, A., Alabdulkareem, A., Nouh, M., Alsaleh, M., Alarifi, A., Sanchez, A., Alfaris, A., Williams, J.: A malicious activity detection system utilizing predictive modeling in complex environments. In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 371\u2013379 (2014). doi: 10.1109\/CCNC.2014.6866597","DOI":"10.1109\/CCNC.2014.6866597"},{"key":"321_CR2","doi-asserted-by":"publisher","unstructured":"Almaatouq, A., Alabdulkareem, A., Nouh, M., Shmueli, E., Alsaleh, M., Singh, V.K., Alarifi, A., Alfaris, A., Pentland, A.S.: Twitter: Who gets caught? Observed trends in social micro-blogging spam. In: Proceedings of the 2014 ACM Conference on Web Science, WebSci \u201914, pp. 33\u201341. ACM, New York, NY, USA (2014). doi: 10.1145\/2615569.2615688","DOI":"10.1145\/2615569.2615688"},{"issue":"6","key":"321_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MIS.2011.78","volume":"26","author":"Y Altshuler","year":"2011","unstructured":"Altshuler, Y., Aharony, N., Pentland, A., Elovici, Y., Cebrian, M.: Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell. Syst. 26(6), 22\u201330 (2011). doi: 10.1109\/MIS.2011.78","journal-title":"IEEE Intell. Syst."},{"issue":"3","key":"321_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10955-013-0759-z","volume":"152","author":"Y Altshuler","year":"2013","unstructured":"Altshuler, Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A., Pentland, A., Lazer, D.: The social amplifier reaction of human communities to emergencies. J. Stat. Phys. 152(3), 399\u2013418 (2013). doi: 10.1007\/s10955-013-0759-z","journal-title":"J. Stat. Phys."},{"key":"321_CR5","doi-asserted-by":"crossref","unstructured":"Alvisi, L., Clement, A., Epasto, A., Lattanzi, S., Panconesi, A.: Sok: The evolution of sybil defense via social networks. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 382\u2013396. IEEE (2013)","DOI":"10.1109\/SP.2013.33"},{"key":"321_CR6","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)"},{"key":"321_CR7","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on Twitter. In: Proceedings of the Seventh Annual Collaboration, Electronic messaging, Anti-abuse and Spam Conference (CEAS) (2010)"},{"key":"321_CR8","doi-asserted-by":"crossref","unstructured":"Beutel, A., Xu, W., Guruswami, V., Palow, C., Faloutsos, C.: Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 119\u2013130. International World Wide Web Conferences Steering Committee (2013)","DOI":"10.1145\/2488388.2488400"},{"issue":"2","key":"321_CR9","doi-asserted-by":"crossref","first-page":"023138","DOI":"10.1063\/1.4729139","volume":"22","author":"J Borondo","year":"2012","unstructured":"Borondo, J., Morales, A.J., Losada, J.C., Benito, R.M.: Characterizing and modeling an electoral campaign in the context of Twitter: 2011 Spanish Presidential election as a case study. Chaos Interdiscip. J. Nonlinear Sci. 22(2), 023138 (2012)","journal-title":"Chaos Interdiscip. J. Nonlinear Sci."},{"issue":"2","key":"321_CR10","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comnet.2012.06.006","volume":"57","author":"Y Boshmaf","year":"2013","unstructured":"Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M.: Design and analysis of a social botnet. Comput. Netw. 57(2), 556\u2013578 (2013)","journal-title":"Comput. Netw."},{"key":"321_CR11","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1080\/0022250X.2001.9990249","volume":"25","author":"U Brandes","year":"2001","unstructured":"Brandes, U.: A faster algorithm for betweenness centrality. J. Math. Sociol. 25, 163\u2013177 (2001)","journal-title":"J. Math. Sociol."},{"key":"321_CR12","unstructured":"Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the detection of fake accounts in large scale social online services. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, pp. 15\u201315. USENIX Association (2012)"},{"key":"321_CR13","doi-asserted-by":"crossref","unstructured":"Cao, Q., Yang, X., Yu, J., Palow, C.: Uncovering large groups of active malicious accounts in online social networks. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 477\u2013488. ACM (2014)","DOI":"10.1145\/2660267.2660269"},{"key":"321_CR14","doi-asserted-by":"crossref","unstructured":"Cassa, C.A., Chunara, R., Mandl, K., Brownstein, J.S.: Twitter as a sentinel in emergency situations: lessons from the Boston marathon explosions. PLoS Curr 5 (2013). http:\/\/currents.plos.org\/disasters\/article\/twitter-as-a-sentinel-in-emergencysituations-lessons-from-the-boston-marathon-explosions\/","DOI":"10.1371\/currents.dis.ad70cd1c8bc585e9470046cde334ee4b"},{"key":"321_CR15","doi-asserted-by":"publisher","unstructured":"Chhabra, S., Aggarwal, A., Benevenuto, F., Kumaraguru, P.: Phi.sh\/ $${\\$}$$ $ ocial: The phishing landscape through short urls. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS \u201911, pp. 92\u2013101. ACM, New York, NY, USA (2011). doi: 10.1145\/2030376.2030387","DOI":"10.1145\/2030376.2030387"},{"key":"321_CR16","doi-asserted-by":"crossref","unstructured":"Conover, M., Ratkiewicz, J., Francisco, M., Gon\u00e7alves, B., Flammini, A., Menczer, F.: Political polarization on twitter. In: Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM) (2011)","DOI":"10.1609\/icwsm.v5i1.14126"},{"key":"321_CR17","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.chb.2013.08.013","volume":"33","author":"C Edwards","year":"2014","unstructured":"Edwards, C., Edwards, A., Spence, P.R., Shelton, A.K.: Is that a bot running the social media feed? Testing the differences in perceptions of communication quality for a human agent and a bot agent on Twitter. Comput. Hum. Behav. 33, 372\u2013376 (2014). doi: 10.1016\/j.chb.2013.08.013","journal-title":"Comput. Hum. Behav."},{"key":"321_CR18","unstructured":"Egele, M., Stringhini, G., Kruegel, C., Vigna, G.: COMPA: Detecting compromised accounts on social networks. In: ISOC Network and Distributed System Security Symposium (NDSS) (2013)"},{"key":"321_CR19","doi-asserted-by":"crossref","unstructured":"Elyashar, A., Fire, M., Kagan, D., Elovici, Y.: Homing socialbots: intrusion on a specific organization\u2019s employee using socialbots. In: Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1358\u20131365. ACM (2013)","DOI":"10.1145\/2492517.2500225"},{"key":"321_CR20","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. arXiv preprint arXiv:1407.5225 (2014)"},{"issue":"1","key":"321_CR21","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman, L.C.: A set of measures of centrality based on betweenness. Sociometry 40(1), 35\u201341 (1977)","journal-title":"Sociometry"},{"key":"321_CR22","doi-asserted-by":"publisher","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference on World Wide Web, WWW \u201912, pp. 61\u201370. ACM, New York, NY, USA (2012). doi: 10.1145\/2187836.2187846","DOI":"10.1145\/2187836.2187846"},{"key":"321_CR23","unstructured":"GlobalWebIndex: Global Web Index: Q4 2012 (2013). http:\/\/www.thesocialclinic.com\/the-state-of-social-media-in-saudi-arabia-2012-2"},{"key":"321_CR24","doi-asserted-by":"publisher","unstructured":"Gonz\u00e1lez-Bail\u00f3n, S., Borge-Holthoefer, J., Rivero, A., Moreno, Y.: The dynamics of protest recruitment through an online network. Sci. Rep. (2011). doi: 10.1038\/srep00197","DOI":"10.1038\/srep00197"},{"key":"321_CR25","doi-asserted-by":"publisher","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: The underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS \u201910, pp. 27\u201337. ACM, New York, NY, USA (2010). doi: 10.1145\/1866307.1866311","DOI":"10.1145\/1866307.1866311"},{"key":"321_CR26","doi-asserted-by":"crossref","unstructured":"Hua, W., Zhang, Y.: Threshold and associative based classification for social spam profile detection on twitter. In: 2013 Ninth International Conference on Semantics, Knowledge and Grids (SKG), pp. 113\u2013120. IEEE (2013)","DOI":"10.1109\/SKG.2013.15"},{"key":"321_CR27","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/978-3-642-32541-0_26","volume-title":"Knowledge Management and Acquisition for Intelligent Systems, Lecture Notes in Computer Science","author":"S Kato","year":"2012","unstructured":"Kato, S., Koide, A., Fushimi, T., Saito, K., Motoda, H.: Network analysis of three twitter functions: favorite, follow and mention. In: Richards, D., Kang, B. (eds.) Knowledge Management and Acquisition for Intelligent Systems, Lecture Notes in Computer Science, vol. 7457, pp. 298\u2013312. Springer, Berlin (2012)"},{"key":"321_CR28","unstructured":"Lumezanu, C., Feamster, N., Klein, H.: bias: Measuring the tweeting behavior of propagandists. In: ICWSM (2012)"},{"key":"321_CR29","doi-asserted-by":"publisher","unstructured":"Marcus, A., Bernstein, M.S., Badar, O., Karger, D.R., Madden, S., Miller, R.C.: Twitinfo: aggregating and visualizing microblogs for event exploration. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI \u201911, pp. 227\u2013236. ACM, New York, NY, USA (2011). doi: 10.1145\/1978942.1978975","DOI":"10.1145\/1978942.1978975"},{"key":"321_CR30","doi-asserted-by":"crossref","unstructured":"McCord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: Proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC\u201911, pp. 175\u2013186. Springer, Berlin (2011). http:\/\/dl.acm.org\/citation.cfm?id=2035700.2035717","DOI":"10.1007\/978-3-642-23496-5_13"},{"key":"321_CR31","unstructured":"Morstatter, F., Pfeffer, J., Liu, H., Carley, K.M.: Is the sample good enough? Comparing data from Twitter\u2019s streaming API with Twitter\u2019s Firehose. In: Proceedings of ICWSM (2013). http:\/\/www.public.asu.edu\/~fmorstat\/paperpdfs\/icwsm2013"},{"key":"321_CR32","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1080\/00107510500052444","volume":"46","author":"MEJ Newman","year":"2005","unstructured":"Newman, M.E.J.: Power laws, pareto distributions and Zipf\u2019s law. Contemp. Phys. 46, 323\u2013351 (2005)","journal-title":"Contemp. Phys."},{"key":"321_CR33","unstructured":"Nguyen, H.: 2013 State of Social Media Spam. Technical report, Nexgate (2013)"},{"issue":"1","key":"321_CR34","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TNN.2003.820841","volume":"15","author":"A Passerini","year":"2004","unstructured":"Passerini, A., Pontil, M., Frasconi, P.: New results on error correcting output codes of kernel machines. IEEE Trans. Neural Netw. 15(1), 45\u201354 (2004). doi: 10.1109\/TNN.2003.820841","journal-title":"IEEE Trans. Neural Netw."},{"key":"321_CR35","unstructured":"Phelps, A.: OpenFuego: Nieman Journalism Lab. http:\/\/niemanlab.github.io\/openfuego\/ (2013). Accessed 16 Sept 2014 (online)"},{"key":"321_CR36","doi-asserted-by":"crossref","unstructured":"Sanzgiri, A., Hughes, A., Upadhyaya, S.: Analysis of malware propagation in twitter. In: 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (SRDS), pp. 195\u2013204. IEEE (2013)","DOI":"10.1109\/SRDS.2013.28"},{"key":"321_CR37","unstructured":"Sharma, P., Biswas, S.: Identifying spam in twitter trending topics. In: American Association for Artificial Intelligence (2011)"},{"key":"321_CR38","unstructured":"Snitzer, B.: EarthQuakes Bot. http:\/\/eqbot.com\/ (2009). Accessed 16 Sept 2014 (online)"},{"key":"321_CR39","doi-asserted-by":"crossref","unstructured":"Song, J., Lee, S., Kim, J.: Spam filtering in twitter using sender-receiver relationship. In: Recent Advances in Intrusion Detection, pp. 301\u2013317. Springer (2011)","DOI":"10.1007\/978-3-642-23644-0_16"},{"key":"321_CR40","doi-asserted-by":"crossref","unstructured":"Stein, T., Chen, E., Mangla, K.: Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, p. 8. ACM (2011)","DOI":"10.1145\/1989656.1989664"},{"key":"321_CR41","doi-asserted-by":"publisher","unstructured":"Stringhini, G., Egele, M., Kruegel, C., Vigna, G.: Poultry markets: on the underground economy of twitter followers. In: Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks, WOSN \u201912, pp. 1\u20136. ACM, New York, NY, USA (2012). doi: 10.1145\/2342549.2342551","DOI":"10.1145\/2342549.2342551"},{"key":"321_CR42","doi-asserted-by":"publisher","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, p. 1. ACM Press, New York, New York, USA (2010). doi: 10.1145\/1920261.1920263 . http:\/\/portal.acm.org\/citation.cfm?doid=1920261.1920263","DOI":"10.1145\/1920261.1920263"},{"issue":"2","key":"321_CR43","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1002\/asi.21462","volume":"62","author":"M Thelwall","year":"2011","unstructured":"Thelwall, M., Buckley, K., Paltoglou, G.: Sentiment in Twitter events. J. Am. Soc. Inf. Sci. Technol. 62(2), 406\u2013418 (2011). doi: 10.1002\/asi.21462","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"321_CR44","unstructured":"Thomas, K., Grier, C., Paxson, V.: Adapting social spam infrastructure for political censorship. In: Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) (2012). https:\/\/www.usenix.org\/conference\/leet12\/adapting-social-spam-infrastructure-political-censorship"},{"key":"321_CR45","doi-asserted-by":"publisher","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V.: Suspended accounts in retrospect: an analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC \u201911, pp. 243\u2013258. ACM, New York, NY, USA (2011). doi: 10.1145\/2068816.2068840","DOI":"10.1145\/2068816.2068840"},{"key":"321_CR46","unstructured":"Thomas, K., McCoy, D., Grier, C., Kolcz, A., Paxson, V.: Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse. In: Proceedings of the 22nd Usenix Security Symposium (2013)"},{"key":"321_CR47","unstructured":"Twitter: Following Rules and Best Practices. https:\/\/support.twitter.com\/articles\/68916-following-rules-and-best-practices (2012). Accessed 22 Oct 2013 (online)"},{"key":"321_CR48","unstructured":"Twitter: Public Stream. https:\/\/dev.twitter.com\/docs\/streaming-apis\/ (2012). Accessed 1 Oct 2013 (online)"},{"key":"321_CR49","unstructured":"Twitter: Rules. https:\/\/support.twitter.com\/articles\/18311-the-twitter-rules (2012) Accessed 1 Oct 2013 (online)"},{"key":"321_CR50","unstructured":"Twitter: Initial Public Offering of Shares of Common Stock of Twitter, Inc (2013). Accessed 5 Oct 2013 (online)"},{"key":"321_CR51","unstructured":"Wagner, C., Mitter, S., K\u00f6rner, C., Strohmaier, M.: When social bots attack: modeling susceptibility of users in online social networks. Making Sense of Microposts (# MSM2012) p. 2 (2012)"},{"key":"321_CR52","doi-asserted-by":"crossref","unstructured":"Wald, R., Khoshgoftaar, T.M., Napolitano, A., Sumner, C.: Predicting susceptibility to social bots on twitter. In: 2013 IEEE 14th International Conference on Information Reuse and Integration (IRI), pp. 6\u201313. IEEE (2013)","DOI":"10.1109\/IRI.2013.6642447"},{"key":"321_CR53","unstructured":"Wang, A.H.: Don\u2019t follow me: spam detection in Twitter. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1\u201310 (2010)"},{"key":"321_CR54","unstructured":"Wang, G., Konolige, T., Wilson, C., Wang, X., Zheng, H., Zhao, B.Y.: You are how you click: clickstream analysis for sybil detection. In: USENIX Security, pp. 241\u2013256 (2013)"},{"key":"321_CR55","unstructured":"Wang, G., Mohanlal, M., Wilson, C., Wang, X., Metzger, M.J., Zheng, H., Zhao, B.Y.: Social turing tests: crowdsourcing sybil detection. In: NDSS. The Internet Society (2013)"},{"key":"321_CR56","doi-asserted-by":"publisher","unstructured":"Xie, Y., Yu, F., Ke, Q., Abadi, M., Gillum, E., Vitaldevaria, K., Walter, J., Huang, J., Mao, Z.M.: Innocent by association: early recognition of legitimate users. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS \u201912, pp. 353\u2013364. ACM, New York, NY, USA (2012). doi: 10.1145\/2382196.2382235","DOI":"10.1145\/2382196.2382235"},{"key":"321_CR57","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol. 6961, pp. 318\u2013337. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-23644-0_17"},{"key":"321_CR58","doi-asserted-by":"publisher","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on Twitter. In: Proceedings of the 21st International Conference on World Wide Web, WWW \u201912, pp. 71\u201380. ACM, New York, NY, USA (2012). doi: 10.1145\/2187836.2187847","DOI":"10.1145\/2187836.2187847"},{"key":"321_CR59","doi-asserted-by":"crossref","unstructured":"Zhang, C.M., Paxson, V.: Detecting and analyzing automated activity on Twitter. In: Proceedings of the 12th International Conference on Passive and Active Measurement, PAM\u201911, pp. 102\u2013111. Springer, Berlin (2011). http:\/\/dl.acm.org\/citation.cfm?id=1987510.1987521","DOI":"10.1007\/978-3-642-19260-9_11"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0321-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-016-0321-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0321-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0321-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T23:29:27Z","timestamp":1692228567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-016-0321-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,20]]},"references-count":59,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["321"],"URL":"https:\/\/doi.org\/10.1007\/s10207-016-0321-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,20]]}}}