{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:03:46Z","timestamp":1760061826749},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T00:00:00Z","timestamp":1297728000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1007\/s13278-011-0017-9","type":"journal-article","created":{"date-parts":[[2011,2,14]],"date-time":"2011-02-14T20:53:02Z","timestamp":1297716782000},"page":"241-254","source":"Crossref","is-referenced-by-count":46,"title":["Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches"],"prefix":"10.1007","volume":"1","author":[{"given":"Mohamed","family":"Fazeen","sequence":"first","affiliation":[]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[]},{"given":"Parthasarathy","family":"Guturu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,15]]},"reference":[{"key":"17_CR1","unstructured":"Bellman RE (1957) Dynamic programming. Rand Corporation"},{"key":"17_CR2","unstructured":"Berkowitz SD (1982) An introduction to structure analysis: the network approach to social research. Butterworth"},{"issue":"1","key":"17_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learning 45(1):5\u201332","journal-title":"Mach Learning"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Cha M, Mislove A, Gummadi KP (2009) A measurement-driven analysis of information propagation in the flickr social network. In: Proceedings of 18th international conference on World wide web, pp 721\u2013730","DOI":"10.1145\/1526709.1526806"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Cheong M, Lee V (2009) Integrating web-based intelligence retrieval and decision-making from the twitter trends knowledge base. In: Proceedings of 2nd ACM workshop on social web search and mining, Hong Kong, pp 1\u20138","DOI":"10.1145\/1651437.1651439"},{"key":"17_CR6","unstructured":"Cingolani P (2010) jfuzzylogic, open source fuzzy logic library and FCL language implementation. http:\/\/jfuzzylogicsourceforgenet\/html\/indexhtml"},{"key":"17_CR7","unstructured":"Commission IE (1997) Technical committee no. 6: Industrial process measurement and control. sub-committee 65 b: Devices. iec 1131-programmable controllers. http:\/\/www.fuzzytechcom\/binaries\/ieccd1pdf"},{"key":"17_CR8","unstructured":"Dorein P, Sockman FN (1997) Evolution of social networks, vol 1. Overseas Publishers Association, Amsterdam"},{"issue":"1","key":"17_CR9","first-page":"75","volume":"3","author":"L Garton","year":"1997","unstructured":"Garton L, Haythornthwaite C, Wellman B (1997) Studying online social networks. J Comp Mediated Commun 3(1):75\u2013105","journal-title":"J Comp Mediated Commun"},{"key":"17_CR10","unstructured":"Kim S, Han S (2009) The method of inferring trust in web-based social network using fuzzy logic. In: Proceedings of international workshop on machine intelligence research, vol 2, pp 140\u2013144"},{"key":"17_CR11","unstructured":"Klym N, Montpetit MJ (2008) Innovation at the edge: social TV and beyond. MIT Communications Futures Program (CFP). http:\/\/cfp.mit.edu\/publications\/CFP_Papers\/Social%20TV%20Final%202008.09.01%20for%20distribution.pdf"},{"issue":"5757","key":"17_CR12","first-page":"88","volume":"311","author":"G Kossinets","year":"2006","unstructured":"Kossinets G, Watts DJ (2006) Empirical analysis of an evolving social network. Sci Agric 311(5757):88\u201390","journal-title":"Sci Agric"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Kumar R, Novak J, Tomkins A (2010) Structure and evolution of online social networks. In: Link mining: models, algorithms, and applications. Springer, Berlin","DOI":"10.1007\/978-1-4419-6515-8_13"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Lin Y, Sundaram H, Chi Y, Tatemura J, Tseng B (2007) Splog detection using content, time and link structures. In: Proceedings of IEEE international conference on multimedia and expo, pp 2030\u20132033","DOI":"10.1109\/ICME.2007.4285079"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Ma W, Tran D, Sharma D (2009) A novel spam email detection system based on negative selection. In: Proceedings of 4th international conference on computer science and convergence information technology, Seoul, pp 987\u2013992","DOI":"10.1109\/ICCIT.2009.58"},{"issue":"2","key":"17_CR16","doi-asserted-by":"crossref","first-page":"482","DOI":"10.2307\/2579058","volume":"63","author":"PV Marsden","year":"1984","unstructured":"Marsden PV, Campbell KE (1984) Measuring tie strength. Social Forces 63(2):482\u2013501","journal-title":"Social Forces"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Mathioudakis M, Koudas N, Marbach P (2010) Early online identification of attention gathering items in social media. In: Proceedings of 3rd ACM international conference web search and data mining, pp 301\u2013310","DOI":"10.1145\/1718487.1718525"},{"key":"17_CR18","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: Homophily in social networks. Annu Rev Sociol 27:415\u2013444","journal-title":"Annu Rev Sociol"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Mislove A, Marcon M, Gummadi KP, Druschel P, Bhattacharjee B (2007) Measurement and analysis of online social networks. In: Proceedings of 7th ACM SIGCOMM conference on international measurement, pp 29\u201342","DOI":"10.1145\/1298306.1298311"},{"issue":"18","key":"17_CR20","doi-asserted-by":"crossref","first-page":"7332","DOI":"10.1073\/pnas.0610245104","volume":"104","author":"JP Onnela","year":"2007","unstructured":"Onnela JP, Saramaki J, Hyvonen J, Szabo G, Lazer D, Kaski K, Kertesz J, Barabasi AL (2007) Structure and tie strengths in mobile communication networks. Proc Natl Acad Sci USA 104(18):7332\u20137336","journal-title":"Proc Natl Acad Sci USA"},{"key":"17_CR21","volume-title":"Neural networks\u2014a systematic introduction","author":"R Rojas","year":"1996","unstructured":"Rojas R (1996) Neural networks\u2014a systematic introduction. Springer, Berlin"},{"key":"17_CR22","volume-title":"Social network analysis","author":"J Scott","year":"1992","unstructured":"Scott J (1992) Social network analysis. Sage, Newbury Park"},{"key":"17_CR23","doi-asserted-by":"crossref","first-page":"204","DOI":"10.2307\/2289546","volume":"85","author":"D Strauss","year":"1990","unstructured":"Strauss D, Ikeda M (1990) Pseudolikelihood estimation for social networks. J Am Stat Assoc 85:204\u2013212","journal-title":"J Am Stat Assoc"},{"key":"17_CR24","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis. Cambridge University Press, Cambridge"},{"issue":"3","key":"17_CR25","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/BF02294547","volume":"61","author":"S Wasserman","year":"1996","unstructured":"Wasserman S, Pattison P (1996) Logit models and logistic regressions for social networks: I. an introduction to markov graphs and p*. Psychometrika 61(3):401\u2013425","journal-title":"Psychometrika"},{"issue":"17","key":"17_CR26","first-page":"1302","volume":"296","author":"DJ Watts","year":"2002","unstructured":"Watts DJ, Dodds PS, Newman MEJ (2002) Identity and search in social networks. Sci Agric 296(17):1302\u20131305","journal-title":"Sci Agric"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Weng J, Lim E, Jiang J, He Q (2010) Twitterrank: finding topic-sensitive influential twitterers. In: Proceedings of 3rd ACM international conference on web search and data mining, New York, pp 261\u2013270","DOI":"10.1145\/1718487.1718520"},{"key":"17_CR28","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1086\/226141","volume":"81","author":"H White","year":"1976","unstructured":"White H, Boorman S, Breiger R (1976) Social structure from multiple networks: I. blockmodels of roles and positions. Am J Sociol 81:730\u2013780","journal-title":"Am J Sociol"},{"key":"17_CR29","unstructured":"Wikipedia (2010) Twitter. http:\/\/enwikipediaorg\/wiki\/Twitter"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Wu C, Zhou B (2009) Analysis of tag within online social networks. In: Procedings of ACM 2009 international conference, pp 21\u201330","DOI":"10.1145\/1531674.1531678"},{"key":"17_CR31","unstructured":"Yeh C, Chiang S (2009) Revisit bayesian approaches for spam detection. In: Proceedings of. 9th international conference for young computer scientists, Hunan, pp 659\u2013664"},{"key":"17_CR32","unstructured":"Zhou B, Pei J, Luk W (2009) A brief survey on anonymization techniques for privacy preserving publishing of social network data. In: Proceedings of ACM SIGKDD Explorations Newsletter, vol 10, pp 12\u201322"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-011-0017-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-011-0017-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-011-0017-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T14:50:01Z","timestamp":1560005401000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-011-0017-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,15]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["17"],"URL":"https:\/\/doi.org\/10.1007\/s13278-011-0017-9","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,15]]}}}