{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T19:33:22Z","timestamp":1774294402424,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-025-00561-5","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T17:02:15Z","timestamp":1753894935000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence"],"prefix":"10.1007","volume":"21","author":[{"given":"Dincy R.","family":"Arikkat","sequence":"first","affiliation":[]},{"given":"P.","family":"Vinod","sequence":"additional","affiliation":[]},{"given":"K. A. Rafidha","family":"Rehiman","sequence":"additional","affiliation":[]},{"given":"Corrado A.","family":"Visaggio","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Di Sorbo","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"561_CR1","volume":"58","author":"S Hasan","year":"2021","unstructured":"Hasan, S., Ali, M., Kurnia, S., Thurasamy, R.: Evaluating the cyber security readiness of organizations and its influence on performance. J. Inf. Secur. Appl. 58, 102726 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"6","key":"561_CR2","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1002\/spy2.318","volume":"6","author":"AN Lone","year":"2023","unstructured":"Lone, A.N., Mustajab, S., Alam, M.: A comprehensive study on cybersecurity challenges and opportunities in the iot world. Secur. Privacy 6(6), 318 (2023)","journal-title":"Secur. Privacy"},{"key":"561_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101867","volume":"95","author":"J Zhao","year":"2020","unstructured":"Zhao, J., Yan, Q., Li, J., Shao, M., He, Z., Li, B.: Timiner: automatically extracting and analyzing categorized cyber threat intelligence from social data. Comput. Secur. 95, 101867 (2020)","journal-title":"Comput. Secur."},{"key":"561_CR4","first-page":"172","volume":"15","author":"M Bromiley","year":"2016","unstructured":"Bromiley, M.: Threat intelligence: what it is, and how to use it effectively. SANS Inst. InfoSec Read. Room 15, 172 (2016)","journal-title":"SANS Inst. InfoSec Read. Room"},{"key":"561_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101589","volume":"87","author":"TD Wagner","year":"2019","unstructured":"Wagner, T.D., Mahbub, K., Palomar, E., Abdallah, A.E.: Cyber threat intelligence sharing: survey and research directions. Comput. Secur. 87, 101589 (2019)","journal-title":"Comput. Secur."},{"issue":"2","key":"561_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3587255","volume":"7","author":"M Asiri","year":"2023","unstructured":"Asiri, M., Saxena, N., Gjomemo, R., Burnap, P.: Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective. ACM Trans. Cyber-Phys. Syst. 7(2), 1\u201333 (2023)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"561_CR7","doi-asserted-by":"crossref","unstructured":"Alves, F., Andongabo, A., Gashi, I., Ferreira, P.M., Bessani, A.: Follow the blue bird: a study on threat data published on twitter. In: Computer Security\u2013ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14\u201318, 2020, Proceedings, Part I 25, pp. 217\u2013236. Springer (2020)","DOI":"10.1007\/978-3-030-58951-6_11"},{"key":"561_CR8","doi-asserted-by":"crossref","unstructured":"Shin, H., Shim, W., Kim, S., Lee, S., Kang, Y.G., Hwang, Y.H.: #twiti: Social listening for threat intelligence. In: Proceedings of the Web Conference 2021, pp. 92\u2013104 (2021)","DOI":"10.1145\/3442381.3449797"},{"key":"561_CR9","doi-asserted-by":"crossref","unstructured":"Liao, X., Yuan, K., Wang, X., Li, Z., Xing, L., Beyah, R.: Acing the ioc game: toward automatic discovery and analysis of open-source cyber threat intelligence. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 755\u2013766 (2016)","DOI":"10.1145\/2976749.2978315"},{"key":"561_CR10","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Dumitras, T.: Chainsmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 458\u2013472. IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00039"},{"key":"561_CR11","doi-asserted-by":"crossref","unstructured":"Husari, G., Al-Shaer, E., Ahmed, M., Chu, B., Niu, X.: Ttpdrill: automatic and accurate extraction of threat actions from unstructured text of cti sources. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 103\u2013115 (2017)","DOI":"10.1145\/3134600.3134646"},{"key":"561_CR12","doi-asserted-by":"crossref","unstructured":"Long, Z., Tan, L., Zhou, S., He, C., Liu, X.: Collecting indicators of compromise from unstructured text of cybersecurity articles using neural-based sequence labelling. In: 2019 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/IJCNN.2019.8852142"},{"key":"561_CR13","doi-asserted-by":"publisher","unstructured":"Niakanlahiji, A., Safarnejad, L., Harper, R., Chu, B.-T.: Iocminer: automatic extraction of indicators of compromise from twitter. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 4747\u20134754 (2019). https:\/\/doi.org\/10.1109\/BigData47090.2019.9006562","DOI":"10.1109\/BigData47090.2019.9006562"},{"key":"561_CR14","unstructured":"Sabottke, C., Suciu, O., Dumitra?, T.: Vulnerability disclosure in the age of social media: Exploiting twitter for predicting real-world exploits. In: 24th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 15), pp. 1041\u20131056 (2015)"},{"key":"561_CR15","doi-asserted-by":"crossref","unstructured":"Schaberreiter, T., Kupfersberger, V., Rantos, K., Spyros, A., Papanikolaou, A., Ilioudis, C., Quirchmayr, G.: A quantitative evaluation of trust in the quality of cyber threat intelligence sources. In: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2019)","DOI":"10.1145\/3339252.3342112"},{"key":"561_CR16","doi-asserted-by":"crossref","unstructured":"Al-Ibrahim, O., Mohaisen, A., Kamhoua, C., Kwiat, K., Njilla, L.: Beyond free riding: quality of indicators for assessing participation in information sharing for threat intelligence. arXiv preprint arXiv:1702.00552 (2017)","DOI":"10.1109\/PAC.2017.39"},{"key":"561_CR17","volume-title":"Scoring model for iocs by combining open intelligence feeds to reduce false positives","author":"J Ermerins","year":"2020","unstructured":"Ermerins, J., Noort, N., Novais Marques, J., Velasco, L.: Scoring model for iocs by combining open intelligence feeds to reduce false positives. Security and Network Engineering, University of Amsterdam, Amsterdam (2020)"},{"issue":"4","key":"561_CR18","doi-asserted-by":"publisher","first-page":"3925","DOI":"10.1007\/s11042-017-5018-x","volume":"78","author":"KS Adewole","year":"2019","unstructured":"Adewole, K.S., Anuar, N.B., Kamsin, A., Sangaiah, A.K.: Smsad: a framework for spam message and spam account detection. Multimed. Tools Appl. 78(4), 3925\u20133960 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"561_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2020.100079","volume":"18","author":"Z Alom","year":"2020","unstructured":"Alom, Z., Carminati, B., Ferrari, E.: A deep learning model for twitter spam detection. Online Soc. Netw. Media 18, 100079 (2020)","journal-title":"Online Soc. Netw. Media"},{"key":"561_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106525","volume":"211","author":"Y Wu","year":"2021","unstructured":"Wu, Y., Fang, Y., Shang, S., Jin, J., Wei, L., Wang, H.: A novel framework for detecting social bots with deep neural networks and active learning. Knowl.-Based Syst. 211, 106525 (2021)","journal-title":"Knowl.-Based Syst."},{"key":"561_CR21","doi-asserted-by":"crossref","unstructured":"Bose, A., Sundari, S.G., Behzadan, V., Hsu, W.H.: Tracing relevant twitter accounts active in cyber threat intelligence domain by exploiting content and structure of twitter network. In: 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/ISI53945.2021.9624754"},{"issue":"3","key":"561_CR22","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/s10796-017-9805-8","volume":"20","author":"R Aswani","year":"2018","unstructured":"Aswani, R., Kar, A.K., Vigneswara Ilavarasan, P.: Detection of spammers in twitter marketing: a hybrid approach using social media analytics and bio inspired computing. Inf. Syst. Front. 20(3), 515\u2013530 (2018)","journal-title":"Inf. Syst. Front."},{"key":"561_CR23","doi-asserted-by":"crossref","unstructured":"Heidari, M., James Jr, H., Uzuner, O.: An empirical study of machine learning algorithms for social media bot detection. In: 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1\u20135. IEEE (2021)","DOI":"10.1109\/IEMTRONICS52119.2021.9422605"},{"key":"561_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101715","volume":"91","author":"J Rodr\u00edguez-Ruiz","year":"2020","unstructured":"Rodr\u00edguez-Ruiz, J., Mata-S\u00e1nchez, J.I., Monroy, R., Loyola-Gonzalez, O., L\u00f3pez-Cuevas, A.: A one-class classification approach for bot detection on twitter. Comput. Secur. 91, 101715 (2020)","journal-title":"Comput. Secur."},{"key":"561_CR25","doi-asserted-by":"crossref","unstructured":"Ranade, P., Piplai, A., Mittal, S., Joshi, A., Finin, T.: Generating fake cyber threat intelligence using transformer-based models. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20139. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534192"},{"key":"561_CR26","doi-asserted-by":"crossref","unstructured":"Shin, H., Shim, W., Moon, J., Seo, J.W., Lee, S., Hwang, Y.H.: Cybersecurity event detection with new and re-emerging words. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 665\u2013678 (2020)","DOI":"10.1145\/3320269.3384721"},{"key":"561_CR27","doi-asserted-by":"crossref","unstructured":"Yagcioglu, S., Seyfioglu, M.S., Citamak, B., Bardak, B., Guldamlasioglu, S., Yuksel, A., Tatli, E.I.: Detecting cybersecurity events from noisy short text. arXiv preprint arXiv:1904.05054 (2019)","DOI":"10.18653\/v1\/N19-1138"},{"key":"561_CR28","doi-asserted-by":"crossref","unstructured":"Horawalavithana, S., Bhattacharjee, A., Liu, R., Choudhury, N., O.\u00a0Hall, L., Iamnitchi, A.: Mentions of security vulnerabilities on reddit, twitter and github. In: IEEE\/WIC\/ACM International Conference on Web Intelligence, pp. 200\u2013207 (2019)","DOI":"10.1145\/3350546.3352519"},{"issue":"9","key":"561_CR29","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.3390\/electronics9091527","volume":"9","author":"H-S Shin","year":"2020","unstructured":"Shin, H.-S., Kwon, H.-Y., Ryu, S.-J.: A new text classification model based on contrastive word embedding for detecting cybersecurity intelligence in twitter. Electronics 9(9), 1527 (2020)","journal-title":"Electronics"},{"issue":"2","key":"561_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJACI.2021040101","volume":"12","author":"S Altalhi","year":"2021","unstructured":"Altalhi, S., Gutub, A.: A survey on predictions of cyber-attacks utilizing real-time twitter tracing recognition. J. Ambient Intell. Human. Comput. 12(2), 1\u201313 (2021)","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"561_CR31","doi-asserted-by":"crossref","unstructured":"Sapienza, A., Ernala, S.K., Bessi, A., Lerman, K., Ferrara, E.: Discover: mining online chatter for emerging cyber threats. In: Companion Proceedings of the The Web Conference 2018, pp. 983\u2013990 (2018)","DOI":"10.1145\/3184558.3191528"},{"key":"561_CR32","doi-asserted-by":"crossref","unstructured":"Peng, P., Yang, L., Song, L., Wang, G.: Opening the blackbox of virustotal: analyzing online phishing scan engines. In: Proceedings of the Internet Measurement Conference, pp. 478\u2013485 (2019)","DOI":"10.1145\/3355369.3355585"},{"key":"561_CR33","doi-asserted-by":"crossref","unstructured":"Wagner, C., Dulaunoy, A., Wagener, G., Iklody, A.: Misp: the design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, pp. 49\u201356 (2016)","DOI":"10.1145\/2994539.2994542"},{"key":"561_CR34","unstructured":"Booth, H., Rike, D., Witte, G.: The national vulnerability database (nvd): Overview (2013)"},{"key":"561_CR35","doi-asserted-by":"crossref","unstructured":"Nayak, S., Nadig, D., Ramamurthy, B.: Analyzing malicious urls using a threat intelligence system. In: 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/ANTS47819.2019.9118051"},{"key":"561_CR36","unstructured":"Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y., Wang, G.: Towards the detection of inconsistencies in public security vulnerability reports. In: USENIX Security Symposium, pp. 869\u2013885 (2019)"},{"key":"561_CR37","doi-asserted-by":"crossref","unstructured":"Kristiansen, L.-M., Agarwal, V., Franke, K., Shah, R.S.: Cti-twitter: Gathering cyber threat intelligence from twitter using integrated supervised and unsupervised learning. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 2299\u20132308. IEEE (2020)","DOI":"10.1109\/BigData50022.2020.9378393"},{"key":"561_CR38","doi-asserted-by":"crossref","unstructured":"Behzadan, V., Aguirre, C., Bose, A., Hsu, W.: Corpus and deep learning classifier for collection of cyber threat indicators in twitter stream. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 5002\u20135007. IEEE (2018)","DOI":"10.1109\/BigData.2018.8622506"},{"key":"561_CR39","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: Global vectors for word representation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"561_CR40","doi-asserted-by":"crossref","unstructured":"Stojanovski, D., Strezoski, G., Madjarov, G., Dimitrovski, I.: Emotion identification in fifa world cup tweets using convolutional neural network. In: 2015 11th International Conference on Innovations in Information Technology (IIT), pp. 52\u201357. IEEE (2015)","DOI":"10.1109\/INNOVATIONS.2015.7381514"},{"issue":"16","key":"561_CR41","doi-asserted-by":"publisher","first-page":"8117","DOI":"10.3390\/app12168117","volume":"12","author":"E Alothali","year":"2022","unstructured":"Alothali, E., Salih, M., Hayawi, K., Alashwal, H.: Bot-mgat: a transfer learning model based on a multi-view graph attention network to detect social bots. Appl. Sci. 12(16), 8117 (2022)","journal-title":"Appl. Sci."},{"key":"561_CR42","unstructured":"Akhtar, M.M., Sharma, B., Karunanayake, I., Masood, R., Ikram, M., Kanhere, S.S.: Machine learning-based automatic annotation and detection of covid-19 fake news. arXiv preprint arXiv:2209.03162 (2022)"},{"key":"561_CR43","doi-asserted-by":"crossref","unstructured":"Ram, R., Kong, Q., Rizoiu, M.: Birdspotter: A tool for analyzing and labeling twitter users. In: WSDM \u201921, The Fourteenth ACM International Conference on Web Search and Data Mining, Virtual Event, Israel, March 8\u201312, 2021, pp. 918\u2013921 (2021)","DOI":"10.1145\/3437963.3441695"},{"issue":"11","key":"561_CR44","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.1109\/TIFS.2018.2825958","volume":"13","author":"M Fazil","year":"2018","unstructured":"Fazil, M., Abulaish, M.: A hybrid approach for detecting automated spammers in twitter. IEEE Trans. Inf. Forensics Secur. 13(11), 2707\u20132719 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"561_CR45","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s10844-017-0494-z","volume":"51","author":"P Bindu","year":"2018","unstructured":"Bindu, P., Mishra, R., Thilagam, P.S.: Discovering spammer communities in twitter. J. Intell. Inf. Syst. 51(3), 503\u2013527 (2018)","journal-title":"J. Intell. Inf. Syst."},{"key":"561_CR46","doi-asserted-by":"crossref","unstructured":"Mateen, M., Iqbal, M.A., Aleem, M., Islam, M.A.: A hybrid approach for spam detection for twitter. In: 2017 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 466\u2013471. IEEE (2017)","DOI":"10.1109\/IBCAST.2017.7868095"},{"key":"561_CR47","doi-asserted-by":"crossref","unstructured":"Er\u015fahin, B., Akta\u015f, \u00d6., K\u0131l\u0131n\u00e7, D., Akyol, C.: Twitter fake account detection. In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 388\u2013392. IEEE (2017)","DOI":"10.1109\/UBMK.2017.8093420"},{"issue":"1","key":"561_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01969722.2017.1412866","volume":"49","author":"M Singh","year":"2018","unstructured":"Singh, M., Bansal, D., Sofat, S.: Who is who on twitter-spammer, fake or compromised account? a tool to reveal true identity in real-time. Cybern. Syst. 49(1), 1\u201325 (2018)","journal-title":"Cybern. Syst."},{"key":"561_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107360","volume":"107","author":"L Ilias","year":"2021","unstructured":"Ilias, L., Roussaki, I.: Detecting malicious activity in twitter using deep learning techniques. Appl. Soft Comput. 107, 107360 (2021)","journal-title":"Appl. Soft Comput."},{"issue":"12","key":"561_CR50","doi-asserted-by":"publisher","first-page":"5915","DOI":"10.3390\/app12125915","volume":"12","author":"L Rovito","year":"2022","unstructured":"Rovito, L., Bonin, L., Manzoni, L., De Lorenzo, A.: An evolutionary computation approach for twitter bot detection. Appl. Sci. 12(12), 5915 (2022)","journal-title":"Appl. Sci."},{"issue":"8","key":"561_CR51","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","volume":"8","author":"C Yang","year":"2013","unstructured":"Yang, C., Harkreader, R., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280\u20131293 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"561_CR52","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TCSS.2018.2878852","volume":"5","author":"S Madisetty","year":"2018","unstructured":"Madisetty, S., Desarkar, M.S.: A neural network-based ensemble approach for spam detection in twitter. IEEE Trans. Comput. Soc. Syst. 5(4), 973\u2013984 (2018)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"561_CR53","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhang, J., Chen, X., Xiang, Y., Zhou, W.: 6 million spam tweets: a large ground truth for timely twitter spam detection. In: 2015 IEEE International Conference on Communications (ICC), pp. 7065\u20137070. IEEE (2015)","DOI":"10.1109\/ICC.2015.7249453"},{"key":"561_CR54","doi-asserted-by":"crossref","unstructured":"Mccord, M., Chuah, M.: Spam detection on twitter using traditional classifiers. In: International Conference on Autonomic and Trusted Computing, pp. 175\u2013186. Springer (2011)","DOI":"10.1007\/978-3-642-23496-5_13"},{"key":"561_CR55","doi-asserted-by":"crossref","unstructured":"Amleshwaram, A.A., Reddy, N., Yadav, S., Gu, G., Yang, C.: Cats: Characterizing automation of twitter spammers. In: 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/COMSNETS.2013.6465541"},{"issue":"3","key":"561_CR56","first-page":"29","volume":"8","author":"AT Kabakus","year":"2017","unstructured":"Kabakus, A.T., Kara, R.: A survey of spam detection methods on twitter. Int. J. Adv. Comput. Sci. Appl. 8(3), 29\u201338 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"561_CR57","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.inffus.2017.11.002","volume":"44","author":"H Chen","year":"2018","unstructured":"Chen, H., Liu, J., Lv, Y., Li, M.H., Liu, M., Zheng, Q.: Semi-supervised clue fusion for spammer detection in sina weibo. Inf. Fusion 44, 22\u201332 (2018)","journal-title":"Inf. Fusion"},{"key":"561_CR58","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.physa.2015.12.148","volume":"450","author":"J Pan","year":"2016","unstructured":"Pan, J., Liu, Y., Liu, X., Hu, H.: Discriminating bot accounts based solely on temporal features of microblog behavior. Physica A 450, 193\u2013204 (2016)","journal-title":"Physica A"},{"key":"561_CR59","doi-asserted-by":"crossref","unstructured":"Cardaioli, M., Conti, M., Di Sorbo, A., Fabrizio, E., Laudanna, S., Visaggio, C.A.: It\u2019s a matter of style: Detecting social bots through writing style consistency. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20139 (2021)","DOI":"10.1109\/ICCCN52240.2021.9522339"},{"key":"561_CR60","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta, A.B., D\u00edaz-Rodr\u00edguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., Garc\u00eda, S., Gil-L\u00f3pez, S., Molina, D., Benjamins, R., et al.: Explainable artificial intelligence (xai): concepts, taxonomies, opportunities and challenges toward responsible ai. Inf. Fusion 58, 82\u2013115 (2020)","journal-title":"Inf. Fusion"},{"key":"561_CR61","first-page":"4766","volume":"30","author":"SM Lundberg","year":"2017","unstructured":"Lundberg, S.M., Lee, S.-I.: A unified approach to interpreting model predictions. Adv. Neural Inf. Process. Syst. 30, 4766\u20134777 (2017)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"561_CR62","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cWhy should i trust you?\u201d explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","DOI":"10.1145\/2939672.2939778"},{"issue":"3","key":"561_CR63","doi-asserted-by":"publisher","first-page":"416","DOI":"10.3390\/electronics11030416","volume":"11","author":"A Villal\u00f3n-Huerta","year":"2022","unstructured":"Villal\u00f3n-Huerta, A., Ripoll-Ripoll, I., Marco-Gisbert, H.: Key requirements for the detection and sharing of behavioral indicators of compromise. Electronics 11(3), 416 (2022)","journal-title":"Electronics"},{"key":"561_CR64","unstructured":"Chen, Y., Ding, Z., Wagner, D.: Continuous learning for android malware detection. arXiv preprint arXiv:2302.04332 (2023)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00561-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-025-00561-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00561-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T17:20:41Z","timestamp":1764004841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-025-00561-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"references-count":64,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["561"],"URL":"https:\/\/doi.org\/10.1007\/s11416-025-00561-5","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"12 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Consent for publication was obtained from all the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"25"}}