{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:36:46Z","timestamp":1767141406200,"version":"build-2238731810"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T00:00:00Z","timestamp":1610755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T00:00:00Z","timestamp":1610755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10361-2","type":"journal-article","created":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T02:02:36Z","timestamp":1610762556000},"page":"13575-13591","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Novel authorship verification model for social media accounts compromised by a human"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9598-4975","authenticated-orcid":false,"given":"Suleyman","family":"Alterkav\u0131","sequence":"first","affiliation":[]},{"given":"Hasan","family":"Erbay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,16]]},"reference":[{"key":"10361_CR1","doi-asserted-by":"crossref","unstructured":"Al-Khatib MA, Al-qaoud JK (2020) Authorship verification of opinion articles in online newspapers using the idiolect of author: a comparative study. Inf Commun Soc:1\u201319","DOI":"10.1080\/1369118X.2020.1716039"},{"issue":"11","key":"10361_CR2","first-page":"2878","volume":"9","author":"M Alazab","year":"2014","unstructured":"Alazab M, Huda S, Abawajy J, Islam R, Yearwood J, Venkatraman S, Broadhurst R (2014) A hybrid wrapper-filter approach for malware detection. J Netw 9(11):2878\u20132891","journal-title":"J Netw"},{"issue":"3","key":"10361_CR3","doi-asserted-by":"publisher","first-page":"3213","DOI":"10.1007\/s11042-016-3899-8","volume":"76","author":"S Barbon","year":"2017","unstructured":"Barbon S, Igawa RA, Zarpel\u00e3o B. B. (2017) Authorship verification applied to detection of compromised accounts on online social networks. Multimed Tools Appl 76(3):3213\u20133233","journal-title":"Multimed Tools Appl"},{"key":"10361_CR4","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In: Collaboration, electronic messaging, anti-abuse and spam conference (CEAS), vol 6, pp 12"},{"issue":"2","key":"10361_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.3390\/electronics9020219","volume":"9","author":"S Bhattacharya","year":"2020","unstructured":"Bhattacharya S, Kaluri R, Singh S, Alazab M, Tariq U, et al. (2020) A novel pca-firefly based xgboost classification model for intrusion detection in networks using gpu. Electronics 9(2):219","journal-title":"Electronics"},{"key":"10361_CR6","unstructured":"Boenninghoff B, Rupp J, Nickel RM, Kolossa D (2020) Deep bayes factor scoring for authorship verification. arXiv:2008.10105"},{"key":"10361_CR7","unstructured":"borison R (2014) Presenting: The 100 most influential tech people on twitter. https:\/\/www.businessinsider.com\/100-influential-tech-people-on-twitter-2014-4"},{"key":"10361_CR8","unstructured":"Brestovac G, Grgurinam R (2013) Applying multi-criteria decision analysis methods in embedded systems design"},{"key":"10361_CR9","unstructured":"Calabresi M (2017) Inside russia\u2019s social media war on america. Time Magazine"},{"key":"10361_CR10","unstructured":"Castro A, Lindauer B (2012) Author identification on twitter"},{"key":"10361_CR11","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C (2016) Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd acm sigkdd international conference on knowledge discovery and data mining. ACM, pp 785\u2013794","DOI":"10.1145\/2939672.2939785"},{"key":"10361_CR12","unstructured":"Egele M, Stringhini G, Kruegel C, Vigna G (2013) Compa: Detecting compromised accounts on social networks. In: NDSS"},{"key":"10361_CR13","unstructured":"F\u00fcl\u00f6p J (2005) Introduction to decision making methods. In; BDEI-3 Workshop, washington. Citeseer, pp 1\u201315"},{"issue":"6","key":"10361_CR14","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1109\/TIFS.2014.2316975","volume":"9","author":"NZ Gong","year":"2014","unstructured":"Gong NZ, Frank M, Mittal P (2014) Sybilbelief: a semi-supervised learning approach for structure-based sybil detection. IEEE Trans Inf Forensic Secur 9(6):976\u2013987","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"10361_CR15","unstructured":"Hall MA (1999) Correlation-based feature selection for machine learning"},{"key":"10361_CR16","unstructured":"Jahan A, Edwards KL, Bahraminasab M (2016) Multi-criteria decision analysis for supporting the selection of engineering materials in product design. Butterworth-Heinemann"},{"issue":"3","key":"10361_CR17","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1561\/1500000005","volume":"1","author":"P Juola","year":"2008","unstructured":"Juola P et al (2008) Authorship attribution. Found Trends\u00ae; Inf Retr 1(3):233\u2013334","journal-title":"Found Trends\u00ae; Inf Retr"},{"key":"10361_CR18","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.eswa.2018.07.011","volume":"113","author":"R Kaur","year":"2018","unstructured":"Kaur R, Singh S, Kumar H (2018) Authcom: Authorship verification and compromised account detection in online social networks using ahp-topsis embedded profiling based technique. Expert Syst Appl 113:397\u2013414","journal-title":"Expert Syst Appl"},{"issue":"2","key":"10361_CR19","first-page":"111","volume":"1","author":"S Kotsiantis","year":"2006","unstructured":"Kotsiantis S, Kanellopoulos D, Pintelas P (2006) Data preprocessing for supervised leaning. Int J Comput Sci 1(2):111\u2013117","journal-title":"Int J Comput Sci"},{"key":"10361_CR20","unstructured":"Kumar GD, Kumar GD (2018) Machine learning techniques for improved business analytics. IGI global"},{"key":"10361_CR21","unstructured":"Lagerholm F (2017) Using artificial intelligence to verify authorship of anonymous social media posts"},{"key":"10361_CR22","unstructured":"Lee E (2013) Associated press twitter account hacked in marketmoving attack. Bloomberg Technology"},{"key":"10361_CR23","doi-asserted-by":"crossref","unstructured":"Li JS, Monaco JV, Chen LC, Tappert CC (2014) Authorship authentication using short messages from social networking sites. In: 2014 IEEE 11Th international conference on e-business engineering. IEEE, pp 314\u2013319","DOI":"10.1109\/ICEBE.2014.61"},{"key":"10361_CR24","unstructured":"Maria KA (2016) Authorship Attribution Forensics: Feature selection methods in authorship identification using a small e-mail dataset. Master\u2019s thesis, Technoglossia University, Greec"},{"key":"10361_CR25","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Advances in neural information processing systems, pp 3111\u20133119"},{"key":"10361_CR26","doi-asserted-by":"crossref","unstructured":"Nauta M (2016) Detecting hacked twitter accounts by examining behavioural change using twtter metadata. In: Proceedings of the 25th Twente Student Conference on IT","DOI":"10.5220\/0006213600190031"},{"key":"10361_CR27","unstructured":"Okereafor K, Adelaiye O Randomized cyber attack simulation model: A cybersecurity mitigation proposal for post covid-19 digital era"},{"key":"10361_CR28","doi-asserted-by":"crossref","unstructured":"Parmigiani G (2001) Decision theory. Bayesian","DOI":"10.1016\/B0-08-043076-7\/00403-4"},{"key":"10361_CR29","unstructured":"phys.org: Twitter to double tweet limit to 280 characters (update) (2017). https:\/\/phys.org\/news\/2017-11-twitter-character-limit.html"},{"key":"10361_CR30","unstructured":"Press CU (2009) Tokenization. https:\/\/nlp.stanford.edu\/IR-book\/html\/htmledition\/tokenization-1.html"},{"key":"10361_CR31","unstructured":"Ramos J, et al. (2003) Using tf-idf to determine word relevance in document queries. In: Proceedings of the first instructional conference on machine learning, vol 242, Piscataway, pp 133\u2013142"},{"issue":"1","key":"10361_CR32","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TIFS.2016.2603960","volume":"12","author":"A Rocha","year":"2016","unstructured":"Rocha A, Scheirer WJ, Forstall CW, Cavalcante T, Theophilo A, Shen B, Carvalho AR, Stamatatos E (2016) Authorship attribution for social media forensics. IEEE Trans Inf Forensic Secur 12(1):5\u201333","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"10361_CR33","doi-asserted-by":"crossref","unstructured":"Roszkowska E (2013) Rank ordering criteria weighting methods\u2013a comparative overview","DOI":"10.15290\/ose.2013.05.65.02"},{"key":"10361_CR34","doi-asserted-by":"crossref","unstructured":"Saaty TL (2001) Decision making with the analytic network process (anp) and its super decisions software: the national missile defense (nmd) example. ISAHP 2001 proceedings, pp 2\u20134","DOI":"10.13033\/isahp.y2001.028"},{"key":"10361_CR35","unstructured":"Saaty TL (2005) Theory and applications of the analytic network process: decision making with benefits, opportunities, costs, and risks. RWS publications"},{"issue":"1","key":"10361_CR36","first-page":"83","volume":"1","author":"TL Saaty","year":"2008","unstructured":"Saaty TL (2008) Decision making with the analytic hierarchy process. Int J Serv Sci 1(1):83\u201398","journal-title":"Int J Serv Sci"},{"key":"10361_CR37","unstructured":"Savyan P, Bhanu SMS (2020) Ubcadet: detection of compromised accounts in twitter based on user behavioural profiling. Multimed Tools Appl:1\u201337"},{"key":"10361_CR38","unstructured":"Schoenfeld B, Giraud-Carrier C, Poggemann M, Christensen J, Seppi K (2018) Preprocessor selection for machine learning pipelines. arXiv:1810.09942"},{"key":"10361_CR39","unstructured":"Seyler D, Li L, Zhai C (2018) Identifying compromised accounts on social media using statistical text analysis. arXiv:1804.07247"},{"issue":"4","key":"10361_CR40","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/TPAMI.2008.111","volume":"31","author":"J Sivic","year":"2008","unstructured":"Sivic J, Zisserman A (2008) Efficient visual search of videos cast as text retrieval. IEEE Trans Pattern Anal Mach Intell 31(4):591\u2013606","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"10361_CR41","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos E (2009) A survey of modern authorship attribution methods. J Amer Soc Inf Sci Technol 60(3):538\u2013556","journal-title":"J Amer Soc Inf Sci Technol"},{"key":"10361_CR42","unstructured":"Statista: Number of social network users worldwide from 2017 to 2025 (2020). https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/"},{"key":"10361_CR43","unstructured":"live stats, I.: Twitter usage statistics (2020). https:\/\/www.internetlivestats.com\/twitter-statistics\/"},{"key":"10361_CR44","doi-asserted-by":"crossref","unstructured":"Steinert-Threlkeld ZC (2018) Twitter as data. Cambridge University Press","DOI":"10.1017\/9781108529327"},{"key":"10361_CR45","doi-asserted-by":"crossref","unstructured":"Suman C, Saha S, Bhattacharyya P, Chaudhari RS (2020) Emoji helps! a multi-modal siamese architecture for tweet user verification. Cogn Comput:1\u201316","DOI":"10.1007\/s12559-020-09715-7"},{"key":"10361_CR46","doi-asserted-by":"crossref","unstructured":"Tr\u00e5ng D, Johansson F, Rosell M (2015) Evaluating algorithms for detection of compromised social media user accounts. In: 2015 Second european network intelligence conference. IEEE, pp 75\u201382","DOI":"10.1109\/ENIC.2015.19"},{"key":"10361_CR47","doi-asserted-by":"crossref","unstructured":"Usha A, Thampi SM (2017) Authorship analysis of social media contents using tone and personality features. In: International conference on security, privacy and anonymity in computation, communication and storage. Springer, pp 212\u2013228","DOI":"10.1007\/978-3-319-72389-1_18"},{"key":"10361_CR48","unstructured":"Worldometers: World population projections (2020). https:\/\/www.worldometers.info\/world-population\/world-population-projections\/"},{"key":"10361_CR49","doi-asserted-by":"crossref","unstructured":"Zangerle E, Specht G (2014) Sorry, i was hacked: a classification of compromised twitter accounts. In: Proceedings of the 29th annual acm symposium on applied computing. ACM, pp 587\u2013593","DOI":"10.1145\/2554850.2554894"}],"updated-by":[{"DOI":"10.1007\/s11042-021-10617-5","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,2,16]],"date-time":"2021-02-16T00:00:00Z","timestamp":1613433600000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10361-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10361-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10361-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T08:25:55Z","timestamp":1627633555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10361-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,16]]},"references-count":49,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10361"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10361-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,16]]},"assertion":[{"value":"4 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2021","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-021-10617-5","URL":"https:\/\/doi.org\/10.1007\/s11042-021-10617-5","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}