{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:14:14Z","timestamp":1773155654767,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10405-7","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T13:06:18Z","timestamp":1609938378000},"page":"11583-11605","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Spam detection on Twitter using a support vector machine and users\u2019 features by identifying their interactions"],"prefix":"10.1007","volume":"80","author":[{"given":"Saleh Beyt Sheikh","family":"Ahmad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2546-826X","authenticated-orcid":false,"given":"Mahnaz","family":"Rafie","sequence":"additional","affiliation":[]},{"given":"Seyed Mojtaba","family":"Ghorabie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"key":"10405_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2020.100079","volume":"18","author":"Z Alom","year":"2020","unstructured":"Alom Z, Carminati B, Ferrari E (2020) A deep learning model for Twitter spam detection. Online Social Networks and Media 18:100079","journal-title":"Online Social Networks and Media"},{"key":"10405_CR2","doi-asserted-by":"crossref","unstructured":"Alsaleh M, Alarifi A, Al-Quayed F, Al-Salman AS (2015) Combating comment spam with machine learning approaches. International Conference on Machine Learning and Applications (ICMLA):295\u2013300","DOI":"10.1109\/ICMLA.2015.192"},{"key":"10405_CR3","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.knosys.2018.04.025","volume":"153","author":"AM Al-Zoubi","year":"2018","unstructured":"Al-Zoubi AM, Faris H, Alqatawna J, Hassonah MA (2018) Evolving support vector machines using Whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts. Knowledge-Based Systems 153:91\u2013104","journal-title":"Knowledge-Based Systems"},{"key":"10405_CR4","first-page":"6","volume-title":"Detecting spammers on Twitter. Collaboration","author":"F Benevenuto","year":"2010","unstructured":"Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on Twitter. Collaboration. Electronic messaging, Anti-Abuse and Spam Conference (CEAS), p 6"},{"key":"10405_CR5","doi-asserted-by":"crossref","unstructured":"Cao C, Caverlee J (2015) Detecting spam URLs in social media via behavioral analysis. European Conference on Information Retrieval (ECIR):703\u2013714","DOI":"10.1007\/978-3-319-16354-3_77"},{"key":"10405_CR6","volume-title":"SPSS","author":"P Chapman","year":"2000","unstructured":"Chapman P, Clinton J, Kerber R, Khabaza T, Reinartz T, Shearer C, Wirth R (2000) CRISP-DM 1.0: Step-by-step data mining guide. In: SPSS"},{"issue":"4","key":"10405_CR7","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1109\/TIFS.2016.2621888","volume":"12","author":"C Chen","year":"2017","unstructured":"Chen C, Wang Y, Zhang J, Xiang Y, Zhou W, Min G (2017) Statistical features-based real-time detection of drifted Twitter spam. IEEE Transactions on Information Forensics and Security 12(4):914\u2013925","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10405_CR8","volume-title":"San Diego","author":"G Danezis","year":"2009","unstructured":"Danezis G, Mittal P (2009) SybilInfer: detecting sybil nodes using social networks. Network and Distributed System Security Symposium (NDSS). In: San Diego. USA, California"},{"issue":"6","key":"10405_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102317","volume":"57","author":"N El-Mawass","year":"2020","unstructured":"El-Mawass N, Honeine P, Vercouter L (2020) SimilCatch: Enhanced social spammers detection on twitter using Markov random fields. Information Processing & Management 57(6):102317","journal-title":"Information Processing & Management"},{"key":"10405_CR10","doi-asserted-by":"crossref","unstructured":"Gao H, Hu J, Wilson C, Li Z, Chen Y, Zhao BY (2010) Detecting and characterizing social spam campaigns. 10th ACM SIGCOMM Internet Measurement Conference (IMC), Melbourne, Australia:35\u201347","DOI":"10.1145\/1879141.1879147"},{"issue":"7","key":"10405_CR11","doi-asserted-by":"publisher","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"A Heydari","year":"2015","unstructured":"Heydari A, Tavakoli MA, Salim N, Heydari Z (2015) Detection of review spam: A survey. Expert Syst Appl. 42(7):3634\u20133642","journal-title":"Expert Syst Appl."},{"key":"10405_CR12","volume-title":"Social Science Research Network (SSRN)","author":"PN Howard","year":"2016","unstructured":"Howard PN, Kollanyi B (2016) Bots, #Strongerln, and #Brexit: Computational propaganda during the UK-EU referendum. In: Social Science Research Network (SSRN)"},{"key":"10405_CR13","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.neucom.2018.07.044","volume":"315","author":"I Inuwa-Dutse","year":"2018","unstructured":"Inuwa-Dutse I, Liptrott M, Korkontzelos I (2018) Detection of spam-posting accounts on Twitter. Neurocomputing 315:496\u2013511","journal-title":"Neurocomputing"},{"key":"10405_CR14","doi-asserted-by":"crossref","unstructured":"Jindal N, Liu B (2008) Opinion spam and analysis. International Conference on Web Search and Data Mining (WSDM):219\u2013230","DOI":"10.1145\/1341531.1341560"},{"key":"10405_CR15","volume-title":"A thesis submitted in fulfillment of the requirements for the degree of Master of Data & Web Science","author":"M Kouvela","year":"2020","unstructured":"Kouvela M (2020) Bot detective: explainable bot detection in twitter. In: A thesis submitted in fulfillment of the requirements for the degree of Master of Data & Web Science"},{"key":"10405_CR16","unstructured":"Lee S, Kim J (2012) WarningBird: detecting suspicious URLs in Twitter stream. 19th Annual Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, pp. 183\u2013195."},{"key":"10405_CR17","unstructured":"Lee K, Eoff BD, Caverlee J (2011) Seven months with the devils: a long-term study of content polluters on Twitter. Fifth International Conference on Weblogs and Social Media:185\u2013192"},{"key":"10405_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cose.2016.12.004","volume":"69","author":"S Liu","year":"2017","unstructured":"Liu S, Wang Y, Zhang J, Chen C, Xiang Y (2017) Addressing the class imbalance problem in Twitter spam detection using ensemble learning. Comput. Secur. 69:35\u201349","journal-title":"Comput. Secur."},{"key":"10405_CR19","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-23496-5_13","volume-title":"Autonomic and Trusted Computing (ATC)","author":"M McCord","year":"2011","unstructured":"McCord M, Chuah M (2011) Spam detection on Twitter using traditional classifiers. In: Calero JMA, Yang LT, M\u00e1rmol FG, Garc\u00eda Villalba LJ, Li AX, Wang Y (eds) Autonomic and Trusted Computing (ATC), vol 6906, pp 175\u2013186"},{"key":"10405_CR20","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller Z, Dickinson B, Deitrick W, Hu W, Wang AH (2014) Twitter spammer detection using data stream clustering. Inf Sci. 260:64\u201373","journal-title":"Inf Sci."},{"key":"10405_CR21","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCSS.2017.2773581","volume":"5","author":"S Sedhai","year":"2018","unstructured":"Sedhai S, Sun A (2018) Semi-supervised spam detection in Twitter stream. IEEE Transactions on Computational Social Systems 5:169\u2013175","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"12","key":"10405_CR22","first-page":"2278","volume":"8","author":"K Subba Reddy","year":"2019","unstructured":"Subba Reddy K, Srinivasa Reddy E (2019) Detecting spam messages in Twitter data by machine learning algorithms using cross validation. International Journal of Innovative Technology and Exploring Engineering (IJITEE). ISSN 8(12):2278\u20133075","journal-title":"ISSN"},{"key":"10405_CR23","doi-asserted-by":"crossref","unstructured":"Thomas K, Grier C, Ma J, Paxson V, Song D, (2011) Design and evaluation of a real-time URL spam filtering service. 32nd IEEE Symposium on Security and Privacy (S&P), Berkeley, California, USA, pp. 447\u2013462.","DOI":"10.1109\/SP.2011.25"},{"key":"10405_CR24","doi-asserted-by":"crossref","unstructured":"Varol O, Ferrara E, Davis CA, Menczer F, Flammini A (2017) Online human-bot interactions: detection, estimation, and characterization. International AAAI Conference on Web and Social Media, AAAI Press, pp. 280\u2013289.","DOI":"10.1609\/icwsm.v11i1.14871"},{"key":"10405_CR25","doi-asserted-by":"crossref","unstructured":"Wu T, Liu S, Zhang J, Xiang Y (2017) Twitter spam detection based on deep learning. Australasian Computer Science Week Multiconference, (3):1\u20138","DOI":"10.1145\/3014812.3014815"},{"key":"10405_CR26","first-page":"71","volume-title":"Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on Twitter. 21st International Conference on World Wide Web, WWW \u201812, ACM","author":"C Yang","year":"2012","unstructured":"Yang C, Harkreader R, Zhang J, Shin S, Gu G (2012) Analyzing spammers\u2019 social networks for fun and profit: a case study of cyber criminal ecosystem on Twitter. 21st International Conference on World Wide Web, WWW \u201812, ACM. USA, New York, NY, pp 71\u201380"},{"issue":"3","key":"10405_CR27","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1109\/TNET.2008.923723","volume":"16","author":"H Yu","year":"2008","unstructured":"Yu H, Kaminsky M, Gibbons PB, Flaxman AD (2008) SybilGuard: defending against sybil attacks via social networks. IEEE\/ACM Transactions on Networking 16(3):576\u2013589","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10405-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10405-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10405-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T19:39:52Z","timestamp":1670701192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10405-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,6]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10405"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10405-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,6]]},"assertion":[{"value":"11 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}