{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T16:19:21Z","timestamp":1764260361112,"version":"3.38.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T00:00:00Z","timestamp":1722988800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T00:00:00Z","timestamp":1722988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"DOI":"10.1007\/s13278-024-01330-w","type":"journal-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:07:15Z","timestamp":1723028835000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Can computer network attributes be useful for identifying low-credibility websites? A case study in Brazil"],"prefix":"10.1007","volume":"14","author":[{"given":"Jo\u00e3o M. M.","family":"Couto","sequence":"first","affiliation":[]},{"given":"Julio C. S.","family":"Reis","sequence":"additional","affiliation":[]},{"given":"Fabr\u00edcio","family":"Benevenuto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,7]]},"reference":[{"issue":"2","key":"1330_CR1","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"H Allcott","year":"2017","unstructured":"Allcott H, Gentzkow M (2017) Social media and fake news in the 2016 election. J Econ Perspect 31(2):211\u2013236","journal-title":"J Econ Perspect"},{"key":"1330_CR2","doi-asserted-by":"crossref","unstructured":"Araujo L, Couto JMM, Nery LF, Rodrigues I, Almeida J, Reis JCS, Benevenuto F (2024) Finding fake news websites in the wild. In: arXiv","DOI":"10.5753\/webmedia.2024.243115"},{"key":"1330_CR3","volume-title":"Modern information retrieval","author":"R Baeza-Yates","year":"1999","unstructured":"Baeza-Yates R, Ribeiro-Neto B (1999) Modern information retrieval, vol 463. ACM press, New York"},{"issue":"1","key":"1330_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103146","volume":"60","author":"P Bazmi","year":"2023","unstructured":"Bazmi P, Asadpour M, Shakery A (2023) Multi-view co-attention network for fake news detection by modeling topic-specific user and news source credibility. Inf Process Manag 60(1):103146","journal-title":"Inf Process Manag"},{"key":"1330_CR5","doi-asserted-by":"crossref","unstructured":"Bozarth L, Budak C (2020) Market forces: quantifying the role of top credible ad servers in the fake news ecosystem. In: Proceedings of the international AAAI conference on web and social media (ICWSM)","DOI":"10.2139\/ssrn.3650585"},{"key":"1330_CR6","doi-asserted-by":"crossref","unstructured":"Couto JM, Reis JC, Cunha \u00cd, Ara\u00fajo L, Benevenuto F (2022) Characterizing low credibility websites in brazil through computer networking attributes. In: Proceedings of the international IEEE\/ACM conference on advances in social networks analysis and mining (ASONAM) pp 42\u201346","DOI":"10.1109\/ASONAM55673.2022.10068660"},{"key":"1330_CR7","doi-asserted-by":"crossref","unstructured":"Daigle L (2004) Whois protocol specification. Technical report, Network working group","DOI":"10.17487\/rfc3912"},{"key":"1330_CR8","doi-asserted-by":"crossref","unstructured":"Depoux A, Martin S, Karafillakis E, Preet R, Wilder-Smith A, Larson H (2020) The pandemic of social media panic travels faster than the covid-19 outbreak","DOI":"10.1093\/jtm\/taaa031"},{"key":"1330_CR9","doi-asserted-by":"crossref","unstructured":"Ferrara E (2017) Disinformation and social bot operations in the run up to the 2017 french presidential election. First Monday 22(8)","DOI":"10.5210\/fm.v22i8.8005"},{"issue":"7","key":"1330_CR10","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59(7):96\u2013104","journal-title":"Commun ACM"},{"key":"1330_CR11","unstructured":"Fletcher R, Cornia A, Graves L, Nielsen RK (2018) Measuring the reach of \u201cfake news\u201d and online disinformation in Europe. Technical report Reuters Institution and University of Oxford"},{"key":"1330_CR12","doi-asserted-by":"crossref","unstructured":"Gie\u0142czyk A, Wawrzyniak R, Chora\u015b M (2019) Evaluation of the existing tools for fake news detection. In: Proceedings of the IFIP international conference on computer information systems and industrial management (CISIM), pp 144\u2013151","DOI":"10.1007\/978-3-030-28957-7_13"},{"key":"1330_CR13","doi-asserted-by":"crossref","unstructured":"Helmstetter S, Paulheim H (2018) Weakly supervised learning for fake news detection on twitter. In: Proceedings of the IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 274\u2013277","DOI":"10.1109\/ASONAM.2018.8508520"},{"key":"1330_CR14","doi-asserted-by":"crossref","unstructured":"Hussain MN, Tokdemir S, Agarwal N, Al-Khateeb S (2018) Analyzing disinformation and crowd manipulation tactics on youtube. In: Proceedings of the IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 1092\u20131095","DOI":"10.1109\/ASONAM.2018.8508766"},{"key":"1330_CR15","doi-asserted-by":"crossref","unstructured":"J\u00fanior M, Melo P, Kansaon D, Mafra V, S\u00e1 K, Benevenuto F (2022) Telegram monitor: monitoring brazilian political groups and channels on telegram. In: Proceedings of the ACM conference on hypertext and social media (HYPERTEXT), pp 228\u2013231","DOI":"10.1145\/3511095.3536375"},{"issue":"6380","key":"1330_CR16","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1126\/science.aao2998","volume":"359","author":"DM Lazer","year":"2018","unstructured":"Lazer DM, Baum MA, Benkler Y, Berinsky AJ, Greenhill KM, Menczer F, Metzger MJ, Nyhan B, Pennycook G, Rothschild D et al (2018) The science of fake news. Science 359(6380):1094\u20131096","journal-title":"Science"},{"issue":"1","key":"1330_CR17","first-page":"2354","volume":"13","author":"I Marques","year":"2022","unstructured":"Marques I, Salles I, Couto JM, Pimenta BC, Assis S, Reis JC, da Silva APC, de Almeida JM, Benevenuto F (2022) A comprehensive dataset of Brazilian fact-checking stories. J Inf Data Manag (JIDM) 13(1):2354","journal-title":"J Inf Data Manag (JIDM)"},{"issue":"253","key":"1330_CR18","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/01621459.1951.10500769","volume":"46","author":"FJ Massey Jr","year":"1951","unstructured":"Massey FJ Jr (1951) The Kolmogorov-Smirnov test for goodness of fit. J Am Stat Assoc 46(253):68\u201378","journal-title":"J Am Stat Assoc"},{"key":"1330_CR19","doi-asserted-by":"crossref","unstructured":"Melo P, Messias J, Resende G, Garimella K, Almeida J, Benevenuto F (2019) Whatsapp monitor: a fact-checking system for whatsapp. In: Proceedings of the international AAAI conference on web and social media (ICWSM)","DOI":"10.1609\/icwsm.v13i01.3271"},{"key":"1330_CR20","unstructured":"P\u00e9rez-Rosas V, Kleinberg B, Lefevre A, Mihalcea R (2017) Automatic detection of fake news. In: Proceedings of the international conference on computational linguistics, pp 3391\u20133401"},{"issue":"1","key":"1330_CR21","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/s13278-022-00890-z","volume":"12","author":"B Rath","year":"2022","unstructured":"Rath B, Salecha A, Srivastava J (2022) Fake news spreader detection using trust-based strategies in social networks with bot filtration. Soc Netw Anal Min 12(1):66","journal-title":"Soc Netw Anal Min"},{"issue":"2","key":"1330_CR22","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIS.2019.2899143","volume":"34","author":"JC Reis","year":"2019","unstructured":"Reis JC, Correia A, Murai F, Veloso A, Benevenuto F (2019) Supervised learning for fake news detection. IEEE Intell Syst 34(2):76\u201381","journal-title":"IEEE Intell Syst"},{"key":"1330_CR23","doi-asserted-by":"crossref","unstructured":"Resende G, Melo P, Sousa H, Messias J, Vasconcelos M, Almeida J, Benevenuto F (2019) (mis)information dissemination in whatsapp: gathering, analyzing and countermeasures. In: Proceedings of the web conference (WWW), pp 818\u2013828","DOI":"10.1145\/3308558.3313688"},{"key":"1330_CR24","doi-asserted-by":"crossref","unstructured":"Ribeiro MH, Ottoni R, West R, Almeida VA, Meira\u00a0Jr W (2020) Auditing radicalization pathways on youtube. In: Proceedings of the conference on fairness, accountability, and transparency (FAT), pp 131\u2013141","DOI":"10.1145\/3351095.3372879"},{"key":"1330_CR25","doi-asserted-by":"crossref","unstructured":"Saez-Trumper D (2014) Fake tweet buster: a webtool to identify users promoting fake news on twitter. In: Proceedings of the ACM conference on hypertext and social media (HYPERTEXT), pp 316\u2013317","DOI":"10.1145\/2631775.2631786"},{"key":"1330_CR26","doi-asserted-by":"crossref","unstructured":"Shao C, Ciampaglia GL, Flammini A, Menczer F (2016) Hoaxy: a platform for tracking online misinformation. In: Proceedings of the international ACM conference on world wide web (WWW) companion, pp 745\u2013750","DOI":"10.1145\/2872518.2890098"},{"key":"1330_CR27","doi-asserted-by":"crossref","unstructured":"Shu K, Wang S, Liu H (2018) Understanding user profiles on social media for fake news detection. In: IEEE conference on multimedia information processing and retrieval (MIPR), pp 430\u2013435","DOI":"10.1109\/MIPR.2018.00092"},{"key":"1330_CR28","doi-asserted-by":"crossref","unstructured":"Silva M, Oliveira LSD, Andreou A, Melo POVd, Goga O, Benevenuto F (2020) Facebook ads monitor: an independent auditing system for political ads on facebook. In: Proceedings of the web conference (WWW)","DOI":"10.1145\/3366423.3380109"},{"issue":"3","key":"1330_CR29","first-page":"150","volume":"34","author":"D Spohr","year":"2017","unstructured":"Spohr D (2017) Fake news and ideological polarization: filter bubbles and selective exposure on social media. Bus Inf Rev 34(3):150\u2013160","journal-title":"Bus Inf Rev"},{"key":"1330_CR30","doi-asserted-by":"crossref","first-page":"2928","DOI":"10.3389\/fpsyg.2020.566790","volume":"11","author":"S van Der Linden","year":"2020","unstructured":"van Der Linden S, Roozenbeek J, Compton J (2020) Inoculating against fake news about covid-19. Front Psychol 11:2928","journal-title":"Front Psychol"},{"issue":"86","key":"1330_CR31","first-page":"2579","volume":"9","author":"L van der Maaten","year":"2008","unstructured":"van der Maaten L, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9(86):2579\u20132605","journal-title":"J Mach Learn Res"},{"key":"1330_CR32","doi-asserted-by":"crossref","unstructured":"Volkova S, Shaffer K, Jang JY, Hodas N (2017) Separating facts from fiction: linguistic models to classify suspicious and trusted news posts on twitter. In: Proceedings of the annual meeting of the association for computational linguistics (ACL), pp 647\u2013653","DOI":"10.18653\/v1\/P17-2102"},{"issue":"6380","key":"1330_CR33","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi S, Roy D, Aral S (2018) The spread of true and false news online. Science 359(6380):1146\u20131151","journal-title":"Science"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-024-01330-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-024-01330-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-024-01330-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T05:42:55Z","timestamp":1740462175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-024-01330-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,7]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["1330"],"URL":"https:\/\/doi.org\/10.1007\/s13278-024-01330-w","relation":{},"ISSN":["1869-5469"],"issn-type":[{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2024,8,7]]},"assertion":[{"value":"31 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"153"}}