{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T03:05:50Z","timestamp":1776740750287,"version":"3.51.2"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,1,10]],"date-time":"2018-01-10T00:00:00Z","timestamp":1515542400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10844-017-0494-z","type":"journal-article","created":{"date-parts":[[2018,1,10]],"date-time":"2018-01-10T04:10:35Z","timestamp":1515557435000},"page":"503-527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Discovering spammer communities in twitter"],"prefix":"10.1007","volume":"51","author":[{"given":"P. V.","family":"Bindu","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"P. Santhi","family":"Thilagam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,10]]},"reference":[{"issue":"1","key":"494_CR1","first-page":"37","volume":"6","author":"DW Aha","year":"1991","unstructured":"Aha, D.W., Kibler, D., Albert, M.K. (1991). Instance-based learning algorithms. Machine learning, 6(1), 37\u201366.","journal-title":"Machine learning"},{"key":"494_CR2","doi-asserted-by":"crossref","unstructured":"Baumes, J., Goldberg, M., Magdon-Ismail, M. (2005). Efficient identification of overlapping communities. In International Conference on Intelligence and Security Informatics (pp. 27\u201336). Springer.","DOI":"10.1007\/11427995_3"},{"key":"494_CR3","doi-asserted-by":"crossref","unstructured":"Baumes, J., Goldberg, M., Magdon-Ismail, M., Al Wallace, W. (2004). Discovering hidden groups in communication networks. In International Conference on Intelligence and Security Informatics (pp. 378\u2013389). Springer.","DOI":"10.1007\/978-3-540-25952-7_28"},{"key":"494_CR4","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V. (2010). Detecting spammers on twitter. In Collaboration, electronic messaging, anti-abuse and spam conference (CEAS) (Vol. 6 p. 12)."},{"key":"494_CR5","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K. (2008). Identifying video spammers in online social networks. In Proceedings of the 4th international workshop on adversarial information retrieval on the web (pp. 45\u201352). ACM.","DOI":"10.1145\/1451983.1451996"},{"key":"494_CR6","doi-asserted-by":"crossref","unstructured":"Bhat, S.Y., & Abulaish, M. (2013). Community-based features for identifying spammers in online social networks. In Proceedings of the 2013 IEEE\/ACM international conference on advances in social networks analysis and mining (pp. 100\u2013107). ACM.","DOI":"10.1145\/2492517.2492567"},{"key":"494_CR7","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.jnca.2016.02.021","volume":"68","author":"PV Bindu","year":"2016","unstructured":"Bindu, P.V., & Thilagam, P.S. (2016). Mining social networks for anomalies: Methods and challenges. Journal of Network and Computer Applications, 68, 213\u2013229. https:\/\/doi.org\/10.1016\/j.jnca.2016.02.021.","journal-title":"Journal of Network and Computer Applications"},{"key":"494_CR8","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1016\/j.chb.2017.04.001","volume":"73","author":"PV Bindu","year":"2017","unstructured":"Bindu, P.V., Thilagam, P.S., Ahuja, D. (2017). Discovering suspicious behavior in multilayer social networks. Computers in Human Behavior, 73, 568\u2013582. https:\/\/doi.org\/10.1016\/j.chb.2017.04.001.","journal-title":"Computers in Human Behavior"},{"key":"494_CR9","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1007\/978-1-4614-6170-8_239","volume-title":"Encyclopedia of social network analysis and mining, chap. Multilayered social networks","author":"P Br\u00f3dka","year":"2014","unstructured":"Br\u00f3dka, P., Kazienko, P. (2014). Encyclopedia of social network analysis and mining, chap. Multilayered social networks (pp. 998\u20131013). New York: Springer. https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_239."},{"key":"494_CR10","doi-asserted-by":"crossref","unstructured":"Chu, Z., Gianvecchio, S., Wang, H., & Jajodia, S. (2010). Who is tweeting on twitter: human, bot, or cyborg?. In Proceedings of the 26th annual computer security applications conference (pp. 21\u201330). ACM.","DOI":"10.1145\/1920261.1920265"},{"key":"494_CR11","unstructured":"DeBarr, D., & Wechsler, H. (2009). Spam detection using clustering, random forests, and active learning. In 6th conference on email and anti-spam. Mountain view: Citeseer."},{"key":"494_CR12","unstructured":"Facebook. (2016). Facebook company-info. http:\/\/newsroom.fb.com\/company-info\/."},{"issue":"1","key":"494_CR13","first-page":"26","volume":"1","author":"M Fire","year":"2012","unstructured":"Fire, M., Katz, G., Elovici, Y. (2012). Strangers intrusion detection-detecting spammers and fake proles in social networks based on topology anomalies. HUMAN, 1 (1), 26.","journal-title":"HUMAN"},{"key":"494_CR14","unstructured":"Freund, Y., & Mason, L. (1999). The alternating decision tree learning algorithm. In Proceedings of the sixteenth international conference on machine learning (Vol. 99 pp. 124\u2013133): Morgan kaufmann."},{"key":"494_CR15","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y. (2010). Detecting and characterizing social spam campaigns. In Proceedings of the 10th ACM SIGCOMM conference on internet measurement (pp. 35\u201347). ACM.","DOI":"10.1145\/1879141.1879147"},{"key":"494_CR16","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P. (2012). Understanding and combating link farming in the twitter social network. In Proceedings of the 21st international conference on world wide web (pp. 61\u201370). ACM.","DOI":"10.1145\/2187836.2187846"},{"key":"494_CR17","doi-asserted-by":"crossref","unstructured":"Grier, C., Thomas, K., Paxson, V., Zhang, M. (2010). @ spam: the underground on 140 characters or less. In Proceedings of the 17th ACM conference on computer and communications security (pp. 27\u201337). ACM.","DOI":"10.1145\/1866307.1866311"},{"issue":"2","key":"494_CR18","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1080\/13691180500146185","volume":"8","author":"C Haythornthwaite","year":"2005","unstructured":"Haythornthwaite, C. (2005). Social networks and internet connectivity effects. Information, Communication & Society, 8(2), 125\u2013147. https:\/\/doi.org\/10.1080\/13691180500146185.","journal-title":"Information, Communication & Society"},{"key":"494_CR19","unstructured":"Hu, X., Tang, J., Zhang, Y., Liu, H. (2013). Social spammer detection in microblogging. In Proceedings of the twenty-third international joint conference on artificial intelligence (vol. 13 pp. 2633\u20132639). AAAI Press."},{"key":"494_CR20","unstructured":"John, G.H., & Langley, P. (1995). Estimating continuous distributions in bayesian classifiers. In Proceedings of the eleventh conference on uncertainty in artificial intelligence (pp. 338\u2013345). Morgan kaufmann."},{"key":"494_CR21","doi-asserted-by":"crossref","unstructured":"Kohavi, R., & Quinlan, J.R. (2002). Data mining tasks and methods: Classification: decision-tree discovery. In Handbook of data mining and knowledge discovery (pp. 267\u2013276). Oxford University Press Inc.","DOI":"10.1023\/A:1013266218887"},{"key":"494_CR22","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S. (2010). Uncovering social spammers: social honeypots+ machine learning. In Proceedings of the 33rd international ACM SIGIR conference on research and development in information retrieval (pp. 435\u2013442). ACM.","DOI":"10.1145\/1835449.1835522"},{"key":"494_CR23","unstructured":"Lee, K., Eoff, B.D., Caverlee, J. (2011). Seven months with the devils: a long-term study of content polluters on twitter. In Proceedings of 5th international AAAI conference on weblogs and social media (ICWSM)."},{"issue":"8","key":"494_CR24","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1016\/j.eswa.2012.12.015","volume":"40","author":"J Martinez-Romo","year":"2013","unstructured":"Martinez-Romo, J., & Araujo, L. (2013). Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Systems with Applications, 40(8), 2992\u20133000.","journal-title":"Expert Systems with Applications"},{"key":"494_CR25","unstructured":"Mustafaraj, E., & Metaxas, P.T. (2010). From obscurity to prominence in minutes: Political speech and real-time search. In In proceedings of the WebSci10: extending the frontiers of society on-line."},{"issue":"1","key":"494_CR26","doi-asserted-by":"crossref","first-page":"016110","DOI":"10.1103\/PhysRevE.74.016110","volume":"74","author":"J Reichardt","year":"2006","unstructured":"Reichardt, J., & Bornholdt, S. (2006). Statistical mechanics of community detection. Physical Review E, 74(1), 016110.","journal-title":"Physical Review E"},{"key":"494_CR27","unstructured":"Ratkiewicz, J., Conover, M., Meiss, M., Gon\u00e7alves, B., Flammini, A., Menczer, F. (2011). Detecting and tracking political abuse in social media. In Proceedings of 5th international AAAI conference on weblogs and social media (pp. 297\u2013304)."},{"key":"494_CR28","doi-asserted-by":"crossref","unstructured":"Ratkiewicz, J., Conover, M., Meiss, M., Gon\u00e7alves, B., Patil, S., Flammini, A., Menczer, F. (2011). Truthy: mapping the spread of astroturf in microblog streams. In Proceedings of the 20th international conference companion on world wide web (ICWSM), (pp. 249\u2013252). ACM.","DOI":"10.1145\/1963192.1963301"},{"key":"494_CR29","unstructured":"SciTechBlog (2016). Scitechblog. http:\/\/scitech.blogs.cnn.com\/."},{"key":"494_CR30","doi-asserted-by":"crossref","unstructured":"Shrivastava, N., Majumder, A., Rastogi, R. (2008). Mining (social) network graphs to detect random link attacks. In IEEE 24th international conference on data engineering, 2008. ICDE 2008. (pp. 486\u2013495). IEEE.","DOI":"10.1109\/ICDE.2008.4497457"},{"key":"494_CR31","doi-asserted-by":"crossref","unstructured":"Song, J., Lee, S., Kim, J. (2011). Spam filtering in twitter using sender-receiver relationship. In Recent advances in intrusion detection (pp. 301\u2013317). Springer.","DOI":"10.1007\/978-3-642-23644-0_16"},{"key":"494_CR32","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G. (2010). Detecting spammers on social networks. In Proceedings of the 26th annual computer security applications conference (pp. 1\u20139). ACM.","DOI":"10.1145\/1920261.1920263"},{"key":"494_CR33","doi-asserted-by":"crossref","unstructured":"Swamynathan, G., Wilson, C., Boe, B., Almeroth, K., Zhao, B.Y. (2008). Do social networks improve e-commerce?: a study on social marketplaces. In Proceedings of the 1st workshop on online social networks (pp. 1\u20136). ACM.","DOI":"10.1145\/1397735.1397737"},{"key":"494_CR34","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., Song, D., Paxson, V. (2011). Suspended accounts in retrospect: an analysis of twitter spam. In Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference (pp. 243\u2013258). ACM.","DOI":"10.1145\/2068816.2068840"},{"key":"494_CR35","unstructured":"Twitter. (2016). Twitter company-info. https:\/\/about.twitter.com\/company."},{"key":"494_CR36","unstructured":"Wang, A.H. (2010). Don\u2019t follow me: Spam detection in twitter. In proceedings of the 2010 international conference on Security and cryptography (SECRYPT) (pp. 1\u201310). IEEE."},{"issue":"8","key":"494_CR37","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G. (2013). Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Transactions on Information Forensics and Security, 8(8), 1280\u20131293. https:\/\/doi.org\/10.1109\/TIFS.2013.2267732.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"494_CR38","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G. (2012). Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on world wide web (pp. 71\u201380). ACM.","DOI":"10.1145\/2187836.2187847"},{"key":"494_CR39","doi-asserted-by":"crossref","unstructured":"Yang, C., Zhang, J., Gu, G. (2014). A taste of tweets: reverse engineering twitter spammers. In Proceedings of the 30th annual computer security applications conference (pp. 86\u201395). ACM.","DOI":"10.1145\/2664243.2664258"},{"key":"494_CR40","doi-asserted-by":"crossref","unstructured":"Yardi, S., Romero, D., Schoenebeck, G., & et al. (2009). Detecting spam in a twitter network. First Monday 15(1).","DOI":"10.5210\/fm.v15i1.2793"},{"key":"494_CR41","doi-asserted-by":"publisher","unstructured":"Ying, X., Wu, X., Barbar\u00e1, D. (2011). Spectrum based fraud detection in social networks. In Proceedings of the 27th international conference on data engineering, ICDE 2011, April 11\u201316, 2011, Hannover, Germany, pp. 912\u2013923, https:\/\/doi.org\/10.1109\/ICDE.2011.5767910, (to appear in print).","DOI":"10.1109\/ICDE.2011.5767910"},{"key":"494_CR42","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.neucom.2015.02.047","volume":"159","author":"X Zheng","year":"2015","unstructured":"Zheng, X., Zeng, Z., Chen, Z., Yu, Y., Rong, C. (2015). Detecting spammers on social networks. Neurocomputing, 159, 27\u201334. https:\/\/doi.org\/10.1016\/j.neucom.2015.02.047.","journal-title":"Neurocomputing"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-017-0494-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-017-0494-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-017-0494-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T02:49:59Z","timestamp":1660272599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-017-0494-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,10]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["494"],"URL":"https:\/\/doi.org\/10.1007\/s10844-017-0494-z","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,10]]}}}