{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:14:49Z","timestamp":1740201289874,"version":"3.37.3"},"reference-count":49,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2025,3,4]]},"DOI":"10.1080\/19393555.2024.2378747","type":"journal-article","created":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T17:15:55Z","timestamp":1721236555000},"page":"126-142","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["SIFG: an ensemble model for sieving fake news from genuine without metadata by combining syntactic and semantic features"],"prefix":"10.1080","volume":"34","author":[{"given":"Shahid","family":"Alam","sequence":"first","affiliation":[{"name":"University of Hail","place":["Saudi Arabia"]}]},{"given":"Samina","family":"Khalid","sequence":"additional","affiliation":[{"name":"Departmnet of Computer Science and IT, Mirpur University of Science and Technology","place":["Pakistan"]}]}],"member":"301","published-online":{"date-parts":[[2024,7,17]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69155-8_9"},{"key":"e_1_3_2_3_1","unstructured":"Alam S. & Ravshanbekov A. (2019). Sieving fake news from genuine: A synopsis. https:\/\/arxiv.org\/abs\/1911.08516"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12021"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6072084"},{"key":"e_1_3_2_6_1","first-page":"1","volume-title":"Proceedings of the 24th Symposium on International Database Engineering and Applications (IDEAS)","author":"Anoop K.","year":"2020","unstructured":"Anoop, K., Deepak, P., & Lajish, V. (2020). Emotion cognizance improves health fake news identification. In Proceedings of the 24th Symposium on International Database Engineering and Applications (IDEAS) (pp. 1\u201310). ACM."},{"issue":"6","key":"e_1_3_2_7_1","first-page":"4219","article-title":"Fake news detection in low-resourced languages? kurdish language? using machine learning algorithms","volume":"12","author":"Azad R.","year":"2021","unstructured":"Azad, R., Mohammed, B., Mahmud, R., Zrar, L., & Sdiqa, S. (2021). Fake news detection in low-resourced languages? kurdish language? using machine learning algorithms. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(6), 4219\u20134225.","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418262"},{"issue":"1","key":"e_1_3_2_9_1","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei D. M.","year":"2003","unstructured":"Blei, D. M., Ng, A. Y., & Jordan, M. I. (2003). Latent dirichlet allocation. Journal of Machine Learning Research, 3(1), 993\u20131022. https:\/\/dl.acm.org\/doi\/10.5555\/944919.944937","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287763"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114171"},{"key":"e_1_3_2_12_1","unstructured":"Das S. D. Basak A. & Dutta S. (2021). A heuristic-driven ensemble framework for COVID-19 fake news detection. arXiv preprint arXiv:2101.03545. https:\/\/github.com\/diptamath\/covid_fake_news\/tree\/main\/data."},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.12.037"},{"key":"e_1_3_2_14_1","first-page":"36","volume-title":"Proceedings of the ASIS annual meeting","volume":"25","author":"Deerwester S.","year":"1988","unstructured":"Deerwester, S., Dumais, S., Landauer, T., Furnas, G., & Beck, L. (1988). Improving information-retrieval with latent semantic indexing. Proceedings of the ASIS annual meeting 25, 36\u201340."},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2018.8641018"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.3389\/fsoc.2022.886498"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5508"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"issue":"2","key":"e_1_3_2_19_1","first-page":"1","article-title":"Explainable artificial intelligence (xai)","volume":"2","author":"Gunning D.","year":"2017","unstructured":"Gunning, D. (2017). Explainable artificial intelligence (xai). Defense Advanced Research Projects Agency (DARPA), Nd Web, 2(2), 1.","journal-title":"Defense Advanced Research Projects Agency (DARPA), Nd Web"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/00437956.1954.11659520"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14550"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11583"},{"key":"e_1_3_2_23_1","volume-title":"Self-organizing maps","author":"Kohonen T.","year":"2012","unstructured":"Kohonen, T. (2012). Self-organizing maps (Vol. 30). Springer Science & Business Media."},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-4518"},{"key":"e_1_3_2_25_1","unstructured":"Largent W. (2023). Talos targets disinformation with fake news challenge victory."},{"key":"e_1_3_2_26_1","unstructured":"Leetaru K. (2023). Is twitter really faster than the news?"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1009"},{"key":"e_1_3_2_28_1","unstructured":"Maigrot C. (2019). D\u00e9tection de fausses informations dans les r\u00e9seaux sociaux [Doctoral dissertation Universit\u00e9 Rennes 1]."},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1575365"},{"key":"e_1_3_2_30_1","unstructured":"OpenAI. (2024). ChatGPT. [Online; May 18 2024]."},{"key":"e_1_3_2_31_1","first-page":"45","volume-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks","author":"\u0158eh\u016f\u0159ek R.","year":"2010","unstructured":"\u0158eh\u016f\u0159ek, R., & Sojka, P. (2010). Software framework for topic modelling with large Corpora [http: \/\/is.Muni.cz\/publication\/884893\/en]. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks (pp. 45\u201350)."},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acalib.2020.102304"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1930297500008640"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2018.2866730"},{"key":"e_1_3_2_35_1","first-page":"173","volume-title":"Proceedings of the Conference on Advances in Neural Information Processing Systems (NIPS 1994)","author":"Sato A.","year":"1995","unstructured":"Sato, A., Yamada, K., Kudrimoti, H. S., & McNaughton, B. L. (1995). A model of the neural basis of the rat\u2019s sense of direction. Proceedings of the Conference on Advances in Neural Information Processing Systems (NIPS 1994) (pp. 173\u201380). MIT Press."},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2009.11-08-908"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3181184"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09280-3"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083000"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/math10040569"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111715"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3331220"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.3390\/math9212722"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019735"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJICC-04-2021-0069"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-023-01026-7"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07689-3_14"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2022.101461"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2067"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80023-1"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2024.2378747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:42:53Z","timestamp":1740116573000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2024.2378747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,17]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3,4]]}},"alternative-id":["10.1080\/19393555.2024.2378747"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2024.2378747","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2024,7,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-07-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}