{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:48:59Z","timestamp":1760708939144},"reference-count":35,"publisher":"Oxford University Press (OUP)","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Logic Jnl IGPL"],"DOI":"10.1093\/jigpal\/jzv048","type":"journal-article","created":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:18:20Z","timestamp":1446337100000},"page":"jzv048","source":"Crossref","is-referenced-by-count":49,"title":["Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying"],"prefix":"10.1093","author":[{"given":"Patxi","family":"Gal\u00e1n-Garc\u00cda","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Gaviria De La","family":"Puerta","sequence":"additional","affiliation":[]},{"given":"Carlos Laorden","family":"G\u00f3mez","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Pablo Garc\u00eda","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2015,10,31]]},"reference":[{"key":"2016011900421938000_jzv048v1.1","unstructured":"Baeza-Yates R. A. Ribeiro-Neto B. Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc., 1999."},{"key":"2016011900421938000_jzv048v1.2","doi-asserted-by":"publisher","DOI":"10.1093\/slr\/hms016"},{"key":"2016011900421938000_jzv048v1.3","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","article-title":"Social network sites: definition, history, and scholarship","volume":"13","author":"Boyd","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"key":"2016011900421938000_jzv048v1.4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"2016011900421938000_jzv048v1.5","unstructured":"V. Bush. As we may think, 1945."},{"key":"2016011900421938000_jzv048v1.6","doi-asserted-by":"crossref","unstructured":"M. Dadvar, F. de Jong, R. Ordelman and R. Trieschnigg. Improved Cyberbullying Detection using Gender Information, 2012.","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"2016011900421938000_jzv048v1.7","doi-asserted-by":"crossref","unstructured":"Dadvar M. Trieschnigg D. Ordelman R. de Jong F. Improving cyberbullying detection with user context. In Advances in Information Retrieval, Berlin Heidelberg, pp. 693\u2013696. Springer, 2013.","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"2016011900421938000_jzv048v1.8","unstructured":"K. Dinakar, R. Reichart and H. Lieberman. Modeling the detection of textual cyberbullying. In International Conference on Weblog and Social Media-Social Mobile Web Workshop, 2011."},{"key":"2016011900421938000_jzv048v1.9","unstructured":"Fairthorne R. Mooers C. Towards information retrieval. Archon Books, 1968."},{"key":"2016011900421938000_jzv048v1.10","unstructured":"Garfield E. Merton R. Citation Indexing: Its Theory and Application in Science, Technology, and Humanities, Vol. 8. Wiley New York, 1979."},{"key":"2016011900421938000_jzv048v1.11","unstructured":"S. R. Garner, et al. Weka: The waikato environment for knowledge analysis. In Proceedings of the New Zealand Computer Science Research Students Conference, pp. 57\u201364. Citeseer, 1995."},{"key":"2016011900421938000_jzv048v1.12","doi-asserted-by":"crossref","unstructured":"D. Harman. Overview of the first trec conference. In Proceedings of the 16th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 36\u201347. ACM, 1993.","DOI":"10.1145\/160688.160692"},{"key":"2016011900421938000_jzv048v1.13","doi-asserted-by":"crossref","unstructured":"G. Holmes, A. Donkin and I. H. Witten. Weka: A machine learning workbench. In Intelligent Information Systems, 1994. Proceedings of the 1994 Second Australian and New Zealand Conference on, pp. 357\u2013361. IEEE, 1994.","DOI":"10.1109\/ANZIIS.1994.396988"},{"key":"2016011900421938000_jzv048v1.14","unstructured":"Kent A. Textbook on mechanized information retrieval. Interscience, 1966."},{"key":"2016011900421938000_jzv048v1.15","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1002\/asi.5090060209","article-title":"Machine literature searching viii. operational criteria for designing information retrieval systems","volume":"6","author":"Kent","year":"2007","journal-title":"American documentation"},{"key":"2016011900421938000_jzv048v1.16","unstructured":"R. Kohavi, et al. A study of cross-validation and bootstrap for accuracy estimation and model selection. In International Joint Conference on Artificial Intelligence, Vol. 14, pp. 1137\u20131145. Lawrence Erlbaum Associates Ltd, 1995."},{"key":"2016011900421938000_jzv048v1.17","unstructured":"A. Kontostathis. Chatcoder: toward the tracking and categorization of internet predators. In Text Mining Workshop 2009 held in Conjunction with the 9th Siam International Conference on Data Mining (SDM 2009). Sparks, NV. May 2009."},{"key":"2016011900421938000_jzv048v1.18","doi-asserted-by":"crossref","unstructured":"C. Laorden, P. Gal\u00e1n-Garc\u00eda, I. Santos, B. Sanz, J. M. G. Hidalgo and P. G. Bringas. Negobot: a conversational agent based on game theory for the detection of paedophile behaviour. In International Joint Conference CISIS'12-ICEUTE' 12-SOCO' 12 Special Sessions, pp. 261\u2013270. Springer, 2013.","DOI":"10.1007\/978-3-642-33018-6_27"},{"key":"2016011900421938000_jzv048v1.19","doi-asserted-by":"crossref","unstructured":"C. Laorden, B. Sanz, G. Alvarez and P. G. Bringas. A threat model approach to threats and vulnerabilities in online social networks. In Computational Intelligence in Security for Information Systems 2010, Vol. 85 of Advances in Intelligent and Soft Computing, pp. 135\u2013142, 2010.","DOI":"10.1007\/978-3-642-16626-6_15"},{"key":"2016011900421938000_jzv048v1.20","doi-asserted-by":"publisher","DOI":"10.1147\/rd.14.0309"},{"key":"2016011900421938000_jzv048v1.21","unstructured":"Luhn H. Auto-Encoding of Documents for Information Retrieval Systems. IBM Research Center, 1958."},{"key":"2016011900421938000_jzv048v1.22","unstructured":"J. Palfrey, D. Sacco, D. Boyd, L. DeBonis and J. Tatlock. Enhancing child safety & online technologies. Accessed Online: cyber. law. harvard. edu\/sites\/cyber. law. harvard. edu\/files\/ISTTF_Final_Report. pdf, 2008."},{"key":"2016011900421938000_jzv048v1.23","doi-asserted-by":"crossref","unstructured":"J. Platt, et al. Fast training of support vector machines using sequential minimal optimization. Advances in kernel methods\u2014support vector learning 3, 1999.","DOI":"10.7551\/mitpress\/1130.003.0016"},{"key":"2016011900421938000_jzv048v1.24","unstructured":"Quinlan J. C4. 5: programs for machine learning. Morgan kaufmann, 1993."},{"key":"2016011900421938000_jzv048v1.25","unstructured":"Salton G. McGill M. Introduction to Modern Information Retrieval. McGraw-Hill New York, 1983."},{"key":"2016011900421938000_jzv048v1.26","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/BF00993309","article-title":"C4.5: Programs for machine learning by j. ross quinlan. morgan kaufmann publishers, inc., 1993","volume":"16","author":"Salzberg","year":"1994","journal-title":"Machine Learning"},{"key":"2016011900421938000_jzv048v1.27","unstructured":"B. Sanz, C. Laorden, G. Alvarez and P. G. Bringas. A threat model approach to attacks and countermeasures in online social networks. In In Proceedings of the 11th Reunion Espa\u00f1ola de Criptograf-a y Seguridad de la Informacion (RECSI), 7-10th September, Tarragona (Spain)., pp. 343\u2013348, 2010."},{"key":"2016011900421938000_jzv048v1.28","doi-asserted-by":"crossref","unstructured":"D. A. Simanjuntak, H. P. Ipung, C. Lim and A. S. Nugroho. Text classification techniques used to faciliate cyber terrorism investigation. In Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Conference on, pp. 198\u2013200. IEEE, 2010.","DOI":"10.1109\/ACT.2010.40"},{"key":"2016011900421938000_jzv048v1.29","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2009.026595"},{"key":"2016011900421938000_jzv048v1.30","unstructured":"K. Smets, B. Goethals and B. Verdonk. Automatic vandalism detection in wikipedia: towards a machine learning approach. In AAAI Workshop on Wikipedia and Artificial Intelligence: an Evolving Synergy, pp. 43\u201348, 2008."},{"key":"2016011900421938000_jzv048v1.31","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"2016011900421938000_jzv048v1.32","doi-asserted-by":"crossref","unstructured":"P.-N. Tan, F. Chen and A. Jain. Information assurance: detection of web spam attacks in social media. In Proceedings of Army Science Conference, Orland, Florida, 2010.","DOI":"10.21236\/ADA535002"},{"key":"2016011900421938000_jzv048v1.33","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0042"},{"key":"2016011900421938000_jzv048v1.34","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/604264.604272","article-title":"Mining e-mail content for author identification forensics","volume":"30","author":"De Vel","year":"2001","journal-title":"ACM Sigmod Record"},{"key":"2016011900421938000_jzv048v1.35","doi-asserted-by":"publisher","DOI":"10.1177\/016555159201800106"}],"container-title":["Logic Journal of IGPL"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T18:11:25Z","timestamp":1692123085000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jigpal\/article-lookup\/doi\/10.1093\/jigpal\/jzv048"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,31]]},"references-count":35,"alternative-id":["10.1093\/jigpal\/jzv048"],"URL":"https:\/\/doi.org\/10.1093\/jigpal\/jzv048","relation":{},"ISSN":["1367-0751","1368-9894"],"issn-type":[{"value":"1367-0751","type":"print"},{"value":"1368-9894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,31]]}}}