{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:05:08Z","timestamp":1761807908638,"version":"3.41.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,3,15]],"date-time":"2015-03-15T00:00:00Z","timestamp":1426377600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Scientometrics"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11192-015-1559-9","type":"journal-article","created":{"date-parts":[[2015,3,14]],"date-time":"2015-03-14T11:22:33Z","timestamp":1426332153000},"page":"453-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Mining research trends with anomaly detection models: the case of social computing research"],"prefix":"10.1007","volume":"103","author":[{"given":"Qing","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Xin","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jincai","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,15]]},"reference":[{"issue":"2","key":"1559_CR1","doi-asserted-by":"crossref","first-page":"601","DOI":"10.2298\/CSIS130415035A","volume":"11","author":"Y Abuadlla","year":"2014","unstructured":"Abuadlla, Y., Kvascev, G., Gajin, S., & Jovanovic, Z. (2014). Flow-based anomaly intrusion detection system using two neural network stages. Computer Science and Information Systems, 11(2), 601\u2013622.","journal-title":"Computer Science and Information Systems"},{"key":"1559_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, N. (2011). Collective learning: An integrated use of social media in learning environment. In Social media tools and platforms in learning environments (pp. 37\u201351). Springer, Berlin.","DOI":"10.1007\/978-3-642-20392-3_3"},{"issue":"3","key":"1559_CR3","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1016\/j.pec.2013.06.020","volume":"92","author":"ML Antheunis","year":"2013","unstructured":"Antheunis, M. L., Tates, K., & Nieboer, T. E. (2013). Patients\u2019 and health professionals\u2019 use of social media in health care: Motives, barriers and expectations. Patient Education and Counseling, 92(3), 426\u2013431.","journal-title":"Patient Education and Counseling"},{"issue":"2","key":"1559_CR4","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10115-006-0026-6","volume":"11","author":"S Basu","year":"2007","unstructured":"Basu, S., & Meckesheimer, M. (2007). Automatic outlier detection for time series: An application to sensor data. Knowledge and Information Systems, 11(2), 137\u2013154.","journal-title":"Knowledge and Information Systems"},{"issue":"2","key":"1559_CR5","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.amepre.2013.10.016","volume":"46","author":"DC Brabham","year":"2014","unstructured":"Brabham, D. C., Ribisl, K. M., Kirchner, T. R., & Bernhardt, J. M. (2014). Crowdsourcing applications for public health. American Journal of Preventive Medicine, 46(2), 179\u2013187.","journal-title":"American Journal of Preventive Medicine"},{"key":"1559_CR6","doi-asserted-by":"crossref","unstructured":"Carter, R. R., DiFeo, A., Bogie, K., Zhang, G.-Q., & Sun, J. (2014). Crowdsourcing awareness: Exploration of the ovarian cancer knowledge gap through Amazon Mechanical Turk. PLOS ONE, 9(1). doi: 10.1371\/journal.pone.0085508","DOI":"10.1371\/journal.pone.0085508"},{"issue":"3","key":"1559_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1\u201372.","journal-title":"ACM Computing Surveys"},{"issue":"16","key":"1559_CR8","first-page":"5785","volume":"7","author":"Z Chen","year":"2011","unstructured":"Chen, Z., Yue, W., Shi, J., & Bu, X. (2011). A multi-agent based social computing collaboration selection approach in stable states. Journal of Computational Information Systems, 7(16), 5785\u20135790.","journal-title":"Journal of Computational Information Systems"},{"key":"1559_CR9","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-61520-670-4","volume-title":"Handbook of research on developments in e-health and telemedicine: Technological and social perspectives","author":"MM Cruz-Cunla","year":"2010","unstructured":"Cruz-Cunla, M. M., Tavares, A. J., & Simoes, R. (2010). Handbook of research on developments in e-health and telemedicine: Technological and social perspectives. Hershey: Medical Information Science Reference."},{"issue":"3","key":"1559_CR10","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/s00500-003-0342-7","volume":"9","author":"D Dasgupta","year":"2005","unstructured":"Dasgupta, D., Yu, S., & Majumdar, N. (2005). MILA\u2014Multilevel immune learning algorithm and its application to anomaly detection. Soft Computing, 9(3), 172\u2013184.","journal-title":"Soft Computing"},{"issue":"1","key":"1559_CR11","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.2014.6710071","volume":"52","author":"A Faggiani","year":"2014","unstructured":"Faggiani, A., Gregori, E., Lenzini, L., Luoni, V., & Vecchio, A. (2014). Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study. IEEE Communications Magazine, 52(1), 106\u2013113.","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"1559_CR12","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/2436256.2436274","volume":"56","author":"R Feldman","year":"2013","unstructured":"Feldman, R. (2013). Techniques and applications for sentiment analysis. Communications of the ACM, 56(4), 82\u201389.","journal-title":"Communications of the ACM"},{"key":"1559_CR13","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.neucom.2012.11.050","volume":"122","author":"U Fiore","year":"2013","unstructured":"Fiore, U., Palmieri, F., Castiglione, A., & De Santis, A. (2013). Network anomaly detection with the restricted Boltzmann machine. Neurocomputing, 122, 13\u201323.","journal-title":"Neurocomputing"},{"issue":"3","key":"1559_CR14","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1007\/s11192-011-0521-8","volume":"90","author":"J-Y Fu","year":"2012","unstructured":"Fu, J.-Y., Zhang, X., Zhao, Y.-H., Chen, D.-Z., & Huang, M.-H. (2012). Global performance of traditional Chinese medicine over three decades. Scientometrics, 90(3), 945\u2013958.","journal-title":"Scientometrics"},{"issue":"2","key":"1559_CR15","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1177\/0165551504042802","volume":"30","author":"E Garfield","year":"2004","unstructured":"Garfield, E. (2004). Historiographic mapping of knowledge domains literature. Journal of Information Science, 30(2), 119\u2013145.","journal-title":"Journal of Information Science"},{"issue":"2","key":"1559_CR16","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1005640604267","volume":"48","author":"W Glanzel","year":"2000","unstructured":"Glanzel, W. (2000). Science in Scandinavia: A bibliometric approach. Scientometrics, 48(2), 121\u2013150.","journal-title":"Scientometrics"},{"issue":"1","key":"1559_CR17","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s11192-013-1022-8","volume":"97","author":"W Glanzel","year":"2013","unstructured":"Glanzel, W. (2013). High-end performance or outlier? Evaluating the tail of scientometric distributions. Scientometrics, 97(1), 13\u201323.","journal-title":"Scientometrics"},{"issue":"1","key":"1559_CR18","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s11192-012-0898-z","volume":"96","author":"Glanzel W","year":"2013","unstructured":"Glanzel, W. & Moed, H. F. (2013). Opinion paper: Thoughts and facts on bibliometric indicators. Scientometrics, 96(1), 381\u2013394.","journal-title":"Scientometrics"},{"key":"1559_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00401706.1969.10490657","volume":"11","author":"FE Grubbs","year":"1969","unstructured":"Grubbs, F. E. (1969). Procedures for detecting outlying observations in samples. Technometrics, 11, 1\u201321.","journal-title":"Technometrics"},{"issue":"1","key":"1559_CR20","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2945.981848","volume":"8","author":"S Havre","year":"2002","unstructured":"Havre, S., Hetzler, E., Whitney, P., & Nowell, L. (2002). ThemeRiver: Visualizing thematic changes in large document collections. IEEE Transactions on Visualization and Computer Graphics, 8(1), 9\u201320.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"issue":"10","key":"1559_CR21","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/2500892","volume":"56","author":"A Hoonlor","year":"2013","unstructured":"Hoonlor, A., Szymanski, B. K., & Zaki, M. J. (2013). Trends in computer science research. Communications of the ACM, 56(10), 74\u201383.","journal-title":"Communications of the ACM"},{"issue":"6","key":"1559_CR22","first-page":"1","volume":"14","author":"J Howe","year":"2006","unstructured":"Howe, J. (2006). The rise of crowdsourcing. Wired Magazine, 14(6), 1\u20134.","journal-title":"Wired Magazine"},{"issue":"2","key":"1559_CR23","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1007\/s11192-013-1067-8","volume":"98","author":"Y Hu","year":"2014","unstructured":"Hu, Y., Sun, J., Li, W., & Pan, Y. (2014). A scientometric study of global electric vehicle research. Scientometrics, 98(2), 1269\u20131282.","journal-title":"Scientometrics"},{"issue":"3","key":"1559_CR24","doi-asserted-by":"crossref","first-page":"1275","DOI":"10.1007\/s11192-012-0835-1","volume":"94","author":"BS Kademani","year":"2013","unstructured":"Kademani, B. S., Sagar, A., Surwase, G., & Bhanumurthy, K. (2013). Publication trends in materials science: A global perspective. Scientometrics, 94(3), 1275\u20131295.","journal-title":"Scientometrics"},{"key":"1559_CR25","doi-asserted-by":"crossref","unstructured":"Kierkegaard, P. (2013). eHealth in Denmark: A case study. Journal of Medical Systems, 37(6). doi: 10.1007\/s10916-013-9991-y","DOI":"10.1007\/s10916-013-9991-y"},{"key":"1559_CR26","doi-asserted-by":"crossref","unstructured":"King, I., Li, J., & Chan, K. T. (2009). A brief survey of computational approaches in social computing. In IEEE international joint conference on neural networks (IJCNN) (pp. 2699\u20132706).","DOI":"10.1109\/IJCNN.2009.5178967"},{"issue":"2","key":"1559_CR27","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.ipm.2003.11.004","volume":"41","author":"K Lai","year":"2005","unstructured":"Lai, K., & Wu, S. (2005). Using the patent co-citation approach to establish a new patent classification system. Information Processing & Management, 41(2), 313\u2013330.","journal-title":"Information Processing & Management"},{"key":"1559_CR28","unstructured":"Laurikkala, J., Juhola, M., & Kentala, E. (2000). Informal identification of outliers in medical data. Berlin."},{"issue":"4","key":"1559_CR29","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s10531-010-9981-z","volume":"20","author":"X Liu","year":"2011","unstructured":"Liu, X., Zhang, L., & Hong, S. (2011). Global biodiversity research during 1900\u20132009: A bibliometric analysis. Biodiversity and Conservation, 20(4), 807\u2013826.","journal-title":"Biodiversity and Conservation"},{"issue":"3","key":"1559_CR30","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/s11192-011-0599-z","volume":"92","author":"X Liu","year":"2012","unstructured":"Liu, X., Zhan, F. B., Hong, S., Niu, B., & Liu, Y. (2012). A bibliometric study of earthquake research: 1900\u20132010. Scientometrics, 92(3), 747\u2013765.","journal-title":"Scientometrics"},{"key":"1559_CR31","doi-asserted-by":"crossref","unstructured":"Lugano, G. (2012). Social computing: A classification of existing paradigms. In Proceedings\u20142012 ASE\/IEEE international conference on privacy, security, risk and trust and 2012 ASE\/IEEE international conference on social computing, SocialCom\/PASSAT 2012 (pp. 377\u2013382). Amsterdam.","DOI":"10.1109\/SocialCom-PASSAT.2012.54"},{"key":"1559_CR32","doi-asserted-by":"crossref","unstructured":"Niu, Z., Shi, S., Sun, J., & He, X. (2011). A Survey of outlier detection methodologies and their applications. In Artificial intelligence and computational intelligence, volume 7002 of lecture notes in artificial intelligence (pp. 380\u2013387).","DOI":"10.1007\/978-3-642-23881-9_50"},{"issue":"7","key":"1559_CR33","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1016\/j.cose.2010.05.002","volume":"29","author":"F Palmieri","year":"2010","unstructured":"Palmieri, F., & Fiore, U. (2010). Network anomaly detection through nonlinear analysis. Computers & Security, 29(7), 737\u2013755.","journal-title":"Computers & Security"},{"issue":"5","key":"1559_CR34","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.1002\/cpe.3061","volume":"26","author":"F Palmieri","year":"2014","unstructured":"Palmieri, F., Fiore, U., & Castiglione, A. (2014). A distributed approach to network anomaly detection based on independent component analysis. Concurrency and COmputation\u2014Practice & Experience, 26(5), 1113\u20131129. doi: 10.1002\/cpe.3061","journal-title":"Concurrency and COmputation\u2014Practice & Experience"},{"issue":"6","key":"1559_CR35","doi-asserted-by":"crossref","first-page":"336","DOI":"10.17705\/1jais.00132","volume":"8","author":"M Parameswaran","year":"2007","unstructured":"Parameswaran, M., & Whinston, A. B. (2007). Research issues in social computing. Journal of the Association for Information Systems, 8(6), 336\u2013350.","journal-title":"Journal of the Association for Information Systems"},{"key":"1559_CR36","unstructured":"Pascu, C. (2008). An empirical analysis of the creation, use and adoption of social computing applications. Technical report, Institute for Prospective Technological Studies."},{"issue":"3","key":"1559_CR37","doi-asserted-by":"crossref","first-page":"1781","DOI":"10.1007\/s11192-013-1225-z","volume":"101","author":"G Prathap","year":"2014","unstructured":"Prathap, G. (2014). Single parameter indices and bibliometric outliers. Scientometrics, 101(3), 1781\u20131787.","journal-title":"Scientometrics"},{"key":"1559_CR38","doi-asserted-by":"crossref","unstructured":"Ricci, F., Rokach, L., & Shapira, B. (2011). Introduction to recommender systems handbook. In Recommender systems handbook, (pp. 1\u201335). Springer, New York.","DOI":"10.1007\/978-0-387-85820-3_1"},{"key":"1559_CR39","doi-asserted-by":"crossref","unstructured":"Shoemaker, L., & Hall, L. (2011). Anomaly detection using ensembles. Multiple classifier systems. Volume 6713 of lecture notes in computer science (pp. 6\u201315). Springer, Berlin.","DOI":"10.1007\/978-3-642-21557-5_3"},{"key":"1559_CR40","doi-asserted-by":"crossref","unstructured":"Shuai, X., Pepe, A., & Bollen, J. (2012). How the scientific community reacts to newly submitted preprints: Article downloads, twitter mentions, and citations. PLoS ONE, 7(11), doi: 10.1371\/journal.pone.0047523","DOI":"10.1371\/journal.pone.0047523"},{"issue":"2","key":"1559_CR41","doi-asserted-by":"crossref","first-page":"95","DOI":"10.56093\/ijas.v82i2.15251","volume":"82","author":"B Sinha","year":"2012","unstructured":"Sinha, B. (2012). Global biopesticide research trends: A bibliometric assessment. Indian Journal of Agricultural Sciences, 82(2), 95\u2013101.","journal-title":"Indian Journal of Agricultural Sciences"},{"key":"1559_CR42","unstructured":"SocialCom. (2011). http:\/\/www.asesite.org\/conferences\/socialcom\/2011\/ . Accessed 2011."},{"key":"1559_CR43","doi-asserted-by":"crossref","unstructured":"Srivastava, A. N., & Zane-Ulman, B. (2005). Discovering recurring anomalies in text reports regarding complex space systems. In 2005 IEEE aerospace conference (vols. 1\u20134, pp. 3853\u20133862).","DOI":"10.1109\/AERO.2005.1559692"},{"issue":"3","key":"1559_CR44","doi-asserted-by":"crossref","first-page":"1855","DOI":"10.1007\/s11192-013-1113-6","volume":"98","author":"I Ucar","year":"2014","unstructured":"Ucar, I., Lopez-Fernandino, F., Rodriguez-Ulibarri, P., Sesma-Sanchez, L., Urrea-Mico, V., & Sevilla, J. (2014). Growth in the number of references in engineering journal papers during the 1972\u20132013 period. Scientometrics, 98(3), 1855\u20131864.","journal-title":"Scientometrics"},{"issue":"2","key":"1559_CR45","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/MIS.2007.41","volume":"22","author":"F-Y Wang","year":"2007","unstructured":"Wang, F.-Y., Zeng, D., Carley, K. M., & Mao, W. (2007). Social computing: From social informatics to social intelligence. IEEE Intelligent Systems, 22(2), 79\u201383.","journal-title":"IEEE Intelligent Systems"},{"issue":"3\u20134","key":"1559_CR46","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.landurbplan.2011.11.006","volume":"104","author":"H Wang","year":"2012","unstructured":"Wang, H., He, Q., Liu, X., Zhuang, Y., & Hong, S. (2012). Global urbanization research from 1991 to 2009: A systematic research review. Landscape and Urban Planning, 104(3\u20134), 299\u2013309.","journal-title":"Landscape and Urban Planning"},{"issue":"1\u20133","key":"1559_CR47","doi-asserted-by":"crossref","first-page":"353","DOI":"10.5004\/dwt.2011.2412","volume":"28","author":"M-H Wang","year":"2011","unstructured":"Wang, M.-H., Li, J., & Ho, Y.-S. (2011). Research articles published in water resources journals: A bibliometric analysis. Desalination and Water Treatment, 28(1\u20133), 353\u2013365.","journal-title":"Desalination and Water Treatment"},{"issue":"5","key":"1559_CR48","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MIS.2013.121","volume":"29","author":"T Wang","year":"2014","unstructured":"Wang, T., Liu, Z., Xiu, B., Mo, H., & Zhang, Q. (2014). Characterizing the evolution of social computing research. IEEE Intelligent Systems, 29(5), 48\u201356.","journal-title":"IEEE Intelligent Systems"},{"key":"1559_CR49","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.knosys.2014.06.018","volume":"70","author":"W Wang","year":"2014","unstructured":"Wang, W., Guyet, T., Quiniou, R., Cordier, M.-O., Masseglia, F., & Zhang, X. (2014). Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networksy. Knowledge-based system, 70, 103\u2013117.","journal-title":"Knowledge-based system"},{"issue":"2","key":"1559_CR50","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1007\/s11192-012-0884-5","volume":"95","author":"X Wang","year":"2013","unstructured":"Wang, X., Wang, Z., & Xu, S. (2013). Tracing scientist\u2019s research trends realtimely. Scientometrics, 95(2), 717\u2013729.","journal-title":"Scientometrics"},{"key":"1559_CR51","unstructured":"Wiki. (2014). http:\/\/en.wikipedia.org\/wiki\/social_computing . Accessed 2014."},{"key":"1559_CR52","unstructured":"Wong, W., Moore, A., Cooper, G., & Wagner, M. (2002) Rule-based anomaly pattern detection for detecting disease outbreaks. In: Eighteenth national conference on artificial intelligence (AAAI-02)\/fourteenth innovative applications of artificial intelligence conference (IAAI-02), proceedings (pp. 217\u2013223)."},{"key":"1559_CR53","first-page":"1961","volume":"6","author":"W Wong","year":"2005","unstructured":"Wong, W., Moore, A., Cooper, G., & Wagner, M. (2005). What\u2019s strange about recent events (WSARE): An algorithm for the early detection of disease outbreaks. Journal of Machine Learning Research, 6, 1961\u20131998.","journal-title":"Journal of Machine Learning Research"},{"key":"1559_CR54","unstructured":"xsimilarity. (2014). https:\/\/code.google.com\/p\/xsimilarity\/w\/list . Accessed 2014."},{"key":"1559_CR55","doi-asserted-by":"crossref","unstructured":"Xu, Y., Luo, T., & He, H. (2010). Social computing research map. In Proceedings - 2010 IEEE 2nd symposium on web society, SWS 2010 (pp. 158\u2013164). Beijing.","DOI":"10.1109\/SWS.2010.5607462"},{"issue":"8","key":"1559_CR56","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.ecoleng.2010.04.029","volume":"36","author":"L Zhang","year":"2010","unstructured":"Zhang, L., Wang, M.-H., Hu, J., & Ho, Y.-S. (2010). A review of published wetland research, 1991\u20132008: Ecological engineering and ecosystem restoration. Ecological Engineering, 36(8), 973\u2013980.","journal-title":"Ecological Engineering"},{"issue":"1","key":"1559_CR57","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s11192-011-0428-4","volume":"89","author":"L Zhao","year":"2011","unstructured":"Zhao, L., & Zhang, Q. (2011). Mapping knowledge domains of Chinese digital library research output, 1994\u20132010. Scientometrics, 89(1), 51\u201387.","journal-title":"Scientometrics"},{"issue":"1","key":"1559_CR58","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s11192-012-0918-z","volume":"96","author":"Y Zhuang","year":"2013","unstructured":"Zhuang, Y., Liu, X., Nguyen, T., He, Q., & Hong, S. (2013). Global remote sensing research trends during 1991\u20132010: A bibliometric analysis. Scientometrics, 96(1), 203\u2013219.","journal-title":"Scientometrics"}],"container-title":["Scientometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-015-1559-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11192-015-1559-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-015-1559-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:05:17Z","timestamp":1747785917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11192-015-1559-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,15]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["1559"],"URL":"https:\/\/doi.org\/10.1007\/s11192-015-1559-9","relation":{},"ISSN":["0138-9130","1588-2861"],"issn-type":[{"type":"print","value":"0138-9130"},{"type":"electronic","value":"1588-2861"}],"subject":[],"published":{"date-parts":[[2015,3,15]]}}}