{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:13:42Z","timestamp":1740158022433,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T00:00:00Z","timestamp":1606435200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T00:00:00Z","timestamp":1606435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s12652-020-02644-1","type":"journal-article","created":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T12:03:54Z","timestamp":1606478634000},"page":"5651-5678","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Natural Disaster Resilience Approach (NDRA) to Online Social Networks"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7666-926X","authenticated-orcid":false,"given":"N.","family":"Poornima","sequence":"first","affiliation":[]},{"given":"M.","family":"Murugan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,27]]},"reference":[{"issue":"6","key":"2644_CR1","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1002\/atr.1201","volume":"48","author":"H Abdelgawad","year":"2014","unstructured":"Abdelgawad H, Shalaby A, Abdulhai B, Gutub A (2014) Microscopic modeling of large-scale pedestrian-vehicle conflicts in the city of Madinah, Saudi Arabia. J Adv Transp 48(6):507\u2013525. https:\/\/doi.org\/10.1002\/atr.1201","journal-title":"J Adv Transp"},{"key":"2644_CR2","doi-asserted-by":"crossref","unstructured":"Abu-Nimeh S, Chen TM, Alzubi O (2011) Malicious and spam posts in online social networks. In: Published by the IEEE computer society, 2011 IEEE","DOI":"10.1109\/MC.2011.222"},{"key":"2644_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jnca.2016.11.030","volume":"79","author":"KS Adewole","year":"2017","unstructured":"Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2017) Malicious accounts: dark of the social networks. J Netw Comput Appl 79:41\u201367","journal-title":"J Netw Comput Appl"},{"key":"2644_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal H, Kaushal R (2016) Analysis of text mining techniques over public pages of Facebook. In: 6th International conference on advanced computing, 2016 IEEE","DOI":"10.1109\/IACC.2016.12"},{"key":"2644_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19\u201331. https:\/\/doi.org\/10.1016\/j.jnca.2015.11.016","journal-title":"J Netw Comput Appl"},{"key":"2644_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.05.014","volume":"71","author":"MN Al-Ameen","year":"2016","unstructured":"Al-Ameen MN, Wright M (2016) iPersea: towards improving the sybil-resilience of social DHT. J Netw Comput Appl 71:1\u201310. https:\/\/doi.org\/10.1016\/j.jnca.2016.05.014","journal-title":"J Netw Comput Appl"},{"key":"2644_CR7","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/s11948-013-9502-z","volume":"20","author":"DE Alexander","year":"2014","unstructured":"Alexander DE (2014) Social media in disaster risk reduction and crisis management. Sci Eng Ethics 20:717\u2013733","journal-title":"Sci Eng Ethics"},{"issue":"1","key":"2644_CR8","doi-asserted-by":"publisher","first-page":"9","DOI":"10.20448\/808.2.1.9.18","volume":"2","author":"N Alharthi","year":"2017","unstructured":"Alharthi N, Gutub A (2017) Data visualization to explore improving decision-making within hajj services. Sci Model Res 2(1):9\u201318. https:\/\/doi.org\/10.20448\/808.2.1.9.18","journal-title":"Sci Model Res"},{"issue":"4","key":"2644_CR9","first-page":"449","volume":"10","author":"A Alsaidi","year":"2019","unstructured":"Alsaidi A, Gutub A, Alkhodaidi T (2019) Cybercrime on transportation airline. J Forensic Res 10(4):449","journal-title":"J Forensic Res"},{"issue":"2","key":"2644_CR10","first-page":"17","volume":"15","author":"S Aly","year":"2018","unstructured":"Aly S, Gutub A (2018) Intelligent recognition system for identifying items and pilgrims. NED Univ J Res Themat Issue Adv Image Video Process 15(2):17\u201323","journal-title":"NED Univ J Res Themat Issue Adv Image Video Process"},{"key":"2644_CR11","doi-asserted-by":"crossref","unstructured":"Anitha V, Akilandeswari J, Sowmya P (2014) Auto defence mechanism for SYBIL attacks in manets using QABR Protocol. In: 2014 International conference on advances in electronics, computers and communications (ICAECC), 2014 IEEE","DOI":"10.1109\/ICAECC.2014.7002421"},{"key":"2644_CR12","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.protcy.2012.10.064","volume":"6","author":"P Chakraborty","year":"2012","unstructured":"Chakraborty P, Karform S (2012) Designing trust propagation algorithms based on simple multiplicative strategy for social networks. Procedia Technol 6:534\u2013539. https:\/\/doi.org\/10.1016\/j.protcy.2012.10.064","journal-title":"Procedia Technol"},{"issue":"12","key":"2644_CR13","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1007\/s00371-012-0769-x","volume":"29","author":"S Curtis","year":"2013","unstructured":"Curtis S, Zafar B, Gutub A, Manocha D (2013) Right of way: asymmetric agent interactions in crowds. Vis Comput Int J Comput Gr 29(12):1277\u20131292. https:\/\/doi.org\/10.1007\/s00371-012-0769-x","journal-title":"Vis Comput Int J Comput Gr"},{"issue":"1","key":"2644_CR14","first-page":"40","volume":"27","author":"N Dufty","year":"2012","unstructured":"Dufty N (2012) Using social media to build community disaster resilience. Austral J Emerg Manag 27(1):40\u201345","journal-title":"Austral J Emerg Manag"},{"issue":"4","key":"2644_CR15","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/tsmc","volume":"44","author":"M Eirinaki","year":"2013","unstructured":"Eirinaki M, Louta MD, Varlamis I (2013) A Trust-aware system for personalized user recommendations in social networks. IEEE Trans Syst Man Cybern Syst 44(4):409\u2013421. https:\/\/doi.org\/10.1109\/tsmc","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"2644_CR16","doi-asserted-by":"crossref","unstructured":"Gokula Krishnan S, Karthika S, Bose S (2016) Detection of communities in dynamic social networks. In: Fifth international conference on recent trends in information technology, 2016 IEEE","DOI":"10.1109\/ICRTIT.2016.7569567"},{"key":"2644_CR17","doi-asserted-by":"crossref","unstructured":"Gong NZ, Frank M, Mittal P (2014) SybilBelief: a semi-supervised learning approach for structure-based Sybil detection. In: IEEE transactions on information forensics and security, 2014 IEEE","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"2644_CR18","unstructured":"Gutub A (2015) Exploratory data visualization for smart systems. In: Smart Cities 2015\u20143rd annual digital grids and smart cities workshop, Burj Rafal Hotel Kempinski, Riyadh, Saudi Arabia. https:\/\/doi.org\/10.13140\/RG.2.1"},{"key":"2644_CR19","unstructured":"Gutub A, Alharthi N (2016) Improving Hajj and Umrah services utilizing exploratory data visualization techniques. In: Hajj Forum 2016\u2014the 16th scientific Hajj research Forum, Organized by the Custodian of the Two Holy Mosques Institute for Hajj Research, Umm Al-Qura University\u2014King Abdulaziz Historical Hall, Makkah, Saudi Arabia. https:\/\/doi.org\/10.1437\/430"},{"issue":"8","key":"2644_CR20","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.26735\/165867","volume":"1","author":"A Gutub","year":"2018","unstructured":"Gutub A, Aly S (2018) Trialing a smart face-recognition computer system to recognize lost people visiting the two holy mosques. AJFSFM 1(8):1120\u20131133. https:\/\/doi.org\/10.26735\/165867","journal-title":"AJFSFM"},{"key":"2644_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.socnet.2019.07.004","volume":"60","author":"DS Halgin","year":"2020","unstructured":"Halgin DS, Borgatti SP, Huang Z (2020) Prismatic effects of negative ties. Soc Netw 60:26\u201333","journal-title":"Soc Netw"},{"key":"2644_CR22","doi-asserted-by":"publisher","DOI":"10.1111\/disa.12092","volume-title":"Social media and disasters: a functional framework for social media use in disaster planning, response, and research","author":"B Houston","year":"2014","unstructured":"Houston B, Mildred JH, Eun FP, Park H, Goldstein Hode M, Halliwell MR, Turner SE, Rachel M, Shivani D, Jonathan V, McElderry A, Griffith SA (2014) Social media and disasters: a functional framework for social media use in disaster planning, response, and research. Wiley Publications, Oxford. https:\/\/doi.org\/10.1111\/disa.12092"},{"key":"2644_CR23","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1016\/j.comcom.2007.04.008","volume":"30","author":"MY Hsieh","year":"2007","unstructured":"Hsieh MY, Huang YM, Chao HC (2007) Adaptive security design with malicious user detection in cluster-based sensor networks. Comput Commun 30:2385\u20132400","journal-title":"Comput Commun"},{"key":"2644_CR24","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.ijdrr.2014.09.016","volume":"10","author":"R Islam","year":"2014","unstructured":"Islam R, Walkerden G (2014) How bonding and bridging networks contribute to disaster resilience and recovery on the Bangladeshi coast. Int J Disaster Risk Reduct 10:281\u2013291. https:\/\/doi.org\/10.1016\/j.ijdrr.2014.09.016","journal-title":"Int J Disaster Risk Reduct"},{"key":"2644_CR25","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ijinfomgt.2018.09.005","volume":"44","author":"M Jamalia","year":"2019","unstructured":"Jamalia M, Nejat A, Ghosh S, Jin F, Cao G (2019) Social media data and post-disaster recovery. Int J Inf Manage 44:25\u201337. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.09.005","journal-title":"Int J Inf Manage"},{"key":"2644_CR26","first-page":"23","volume-title":"The role of hedonic behavior in reducing perceived risk: evidence from post earthquake mobile-app data","author":"JS Jia","year":"2016","unstructured":"Jia JS, Jia J, Hsee CK, Shiv B (2016) The role of hedonic behavior in reducing perceived risk: evidence from post earthquake mobile-app data, vol 28. Sage Publication, Thousand Oaks, pp 23\u201335"},{"key":"2644_CR27","doi-asserted-by":"crossref","unstructured":"Jyothi BS, Dharani pragada J (2009) SyMon: defending large structured P2P systems against sybil attack. In: P2P\u201909\u2014Sept. 9\u201311, 2009 IEEE","DOI":"10.1109\/P2P.2009.5284520"},{"key":"2644_CR28","doi-asserted-by":"publisher","first-page":"253","DOI":"10.2495\/ut120231","volume":"128","author":"I Kaysi","year":"2012","unstructured":"Kaysi I, Alshalalfeh B, Sayour M, Gutub A (2012) Rapid transit service in the unique context of Holy Makkah: assessing the first year of operation during the 2010 pilgrimage season. WIT Trans Built Environ Urban Transp XVIII 128:253\u2013267. https:\/\/doi.org\/10.2495\/ut120231","journal-title":"WIT Trans Built Environ Urban Transp XVIII"},{"issue":"1","key":"2644_CR29","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3141\/2350-13","volume":"2350","author":"I Kaysi","year":"2013","unstructured":"Kaysi I, Alshalalfah B, Shalaby A, Sayegh A, Sayour M, Gutub A (2013) Users\u2019 evaluation of rail systems in mass events: case study in mecca, Saudi Arabia. Transp Res Rec J Transp Res Board Issue 2350(1):111\u2013118. https:\/\/doi.org\/10.3141\/2350-13","journal-title":"Transp Res Rec J Transp Res Board Issue"},{"key":"2644_CR30","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s00371-014-0946-1","volume":"31","author":"S Kim","year":"2015","unstructured":"Kim S, Guy SJ, Hillesland K, Zafar B, Gutub A, Manocha D (2015) Velocity-based modeling of physical interactions in dense crowds. Vis Comput 31:541\u2013555. https:\/\/doi.org\/10.1007\/s00371-014-0946-1","journal-title":"Vis Comput"},{"key":"2644_CR31","unstructured":"Kiskani MK, Azimdoost B, Sadjadpour HR (2016) Effect of social groups on the capacity of wireless networks. In: IEEE transactions on wireless communications, January 2016 IEEE"},{"key":"2644_CR32","doi-asserted-by":"crossref","unstructured":"Kokciyan N, Yolum P (2016) PRIGUARD: a semantic approach to detect privacy violations in online social networks. In: IEEE transactions on knowledge and data engineering, 2016 IEEE","DOI":"10.1109\/TKDE.2016.2583425"},{"key":"2644_CR33","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.gloenvcha.2015.09.020","volume":"35","author":"A Mar\u00edn","year":"2015","unstructured":"Mar\u00edn A, Bodin O, Gelcich S, Crona B (2015) Social capital in post-disaster recovery trajectories: Insights from a longitudinal study of tsunami-impacted small-scale fisher organizations in Chile. Glob Environ Change 35:450\u2013462. https:\/\/doi.org\/10.1016\/j.gloenvcha.2015.09.020","journal-title":"Glob Environ Change"},{"issue":"7","key":"2644_CR34","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1109\/tsmc.2018.2830099","volume":"49","author":"K Muhammad","year":"2019","unstructured":"Muhammad K, Ahmad J, Lv Z, Bellavista P, Yang P, Baik SW (2019) Efficient deep CNN-based fire detection and localization in video surveillance applications. IEEE Trans Syst Man Cybern Syst 49(7):1419\u20131434. https:\/\/doi.org\/10.1109\/tsmc.2018.2830099","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"2644_CR35","unstructured":"National Disaster Management Plan (NDMP) (2016) A publication of: National Disaster Management Authority Government of India, NDMA Bhawan, New Delhi, May 2016"},{"key":"2644_CR36","doi-asserted-by":"crossref","unstructured":"Pham A, Huguenin K, Bilogrevic I, Dacosta I, Hubaux JP (2016) SecureRun: cheat-proof and private summaries for location-based activities. In: Transactions on mobile computing, 2016 IEEE","DOI":"10.1109\/TMC.2015.2483498"},{"key":"2644_CR37","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.compeleceng.2017.05.020","volume":"65","author":"D Ramalingam","year":"2018","unstructured":"Ramalingam D, Chinnaiah V (2018) Fake profile detection techniques in large-scale online social networks: a comprehensive review. Comput Electr Eng 65:165\u2013177","journal-title":"Comput Electr Eng"},{"key":"2644_CR38","unstructured":"Renuga DR, Hemalatha M (2013) Sybil user identification algorithm using connectivity threshold for secured community mining in social network. In: IEEE international conference on computational intelligence and computing research 2013 IEEE"},{"key":"2644_CR39","doi-asserted-by":"crossref","unstructured":"Ries S, Aitenbichler E (2009) Limiting Sybil attacks on bayesian trust models in open SOA environments. In: Symposia and workshops on ubiquitous, autonomic and trusted computing 2009 IEEE","DOI":"10.1109\/UIC-ATC.2009.82"},{"key":"2644_CR40","doi-asserted-by":"crossref","unstructured":"Shen H, Liu X (2015) Detecting spammers on twitter based on content and social interaction. In: International conference on network and information systems for computers, 2015 IEEE","DOI":"10.1109\/ICNISC.2015.82"},{"key":"2644_CR41","doi-asserted-by":"crossref","unstructured":"Shi L, Yu S, Lou W, Hou YT (2013) SybilShield: an agent-aided social network-based Sybil defense among multiple communities. In: Proceedings IEEE INFOCOM 2013 IEEE","DOI":"10.1109\/INFCOM.2013.6566893"},{"key":"2644_CR42","first-page":"57","volume-title":"Getting started with TensorFlow deep learning. Deep learning classifiers with memristive networks","author":"Y Toleubay","year":"2019","unstructured":"Toleubay Y, James AP (2019) Getting started with TensorFlow deep learning. Deep learning classifiers with memristive networks. Springer, Berlin, pp 57\u201367"},{"key":"2644_CR43","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s11113-008-9110-9","volume":"28","author":"DM Varda","year":"2009","unstructured":"Varda DM, Forgette R, Banks D, Contractor N (2009) Social network methodology in the study of disasters: issues and insights prompted by post-katrina research. Popul Res Policy Rev 28:11\u201329","journal-title":"Popul Res Policy Rev"},{"key":"2644_CR44","doi-asserted-by":"crossref","unstructured":"Wei W, Xu F, Tan CC, Li Q (2013) SybilDefender: A defense mechanism for sybil attacks in large social networks. In: IEEE transactions on parallel and distributed systems, 2013 IEEE","DOI":"10.1109\/INFCOM.2012.6195572"},{"key":"2644_CR45","doi-asserted-by":"crossref","unstructured":"Yang Z, Xue J, Yang X, Wang X, Dai Y (2016) VoteTrust: leveraging friend invitation graph to defend against social network sybils. In: IEEE Transactions on dependable and secure computing, vol 13(4), July\/August 2016","DOI":"10.1109\/TDSC.2015.2410792"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02644-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02644-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02644-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T15:23:14Z","timestamp":1621869794000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02644-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,27]]},"references-count":45,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["2644"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02644-1","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2020,11,27]]},"assertion":[{"value":"24 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}