{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:24Z","timestamp":1773510924757,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/asonam.2018.8508322","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:19:29Z","timestamp":1540509569000},"page":"825-832","source":"Crossref","is-referenced-by-count":45,"title":["Bot Conversations are Different: Leveraging Network Metrics for Bot Detection in Twitter"],"prefix":"10.1109","author":[{"given":"David M.","family":"Beskow","sequence":"first","affiliation":[]},{"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"key":"ref38","first-page":"223","article-title":"Towards detecting anomalous user behavior in online social networks","author":"viswanath","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref33","author":"neudert","year":"2017","journal-title":"Junk news and bots during the german federal presidency election What were german voters sharing over twitter?"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"ref31","article-title":"# bias: Measuring the tweeting behavior of propagandists","author":"lumezanu","year":"2012","journal-title":"Sixth International AAAI Conference on Weblogs and Social Media"},{"key":"ref30","article-title":"Al Bawaba The Loop","year":"2017","journal-title":"Thousands of twitter bots are attempting to silence reporting on yemen"},{"key":"ref37","article-title":"Five incidents, one theme: Twitter spam as a weapon to drown voices of protest","author":"verkamp","year":"2013","journal-title":"FOCI"},{"key":"ref36","author":"varol","year":"2017","journal-title":"Online human-bot interactions Detection estimation and characterization"},{"key":"ref35","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref34","author":"nimmo","year":"2017","journal-title":"#botspot The intimidators"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492567"},{"key":"ref11","article-title":"Social cyber-security","author":"carley","year":"2018","journal-title":"International Conference on Social Computing Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0096"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.07.030"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/2872518.2889302","article-title":"Botornot: A system to evaluate social bots","author":"davis","year":"2016","journal-title":"Proceedings of 20th International Conference Companion on World Wide Web"},{"key":"ref15","author":"dekker","year":"2006","journal-title":"Measures of simmelian tie strength simmelian brokerage and the simmelianly brokered"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X00032325"},{"key":"ref17","author":"ferrara","year":"2017","journal-title":"Measuring social spam and the effect of bots on information diffusion in social media"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188098"},{"key":"ref19","author":"glaser","year":"2017","journal-title":"Russian bots are trying to sow discord on twitter after charlottesville"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.08.006"},{"key":"ref4","author":"ananthalakshmi","year":"2018","journal-title":"Ahead of malaysian polls bots flood twitter with pro-government"},{"key":"ref27","article-title":"Seven months with the devils: A long-term study of content polluters on twitter","author":"lee","year":"2011","journal-title":"ICWSM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0321-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181405"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21042-1_61"},{"key":"ref5","first-page":"346","article-title":"From tweets to intelligence: Understanding the islamic jihad supporting community on twitter","author":"benigni","year":"2016","journal-title":"Social Cultural and Behavioral Modeling 9th International Conference SBP-BRiMS 2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93372-6_40"},{"key":"ref7","article-title":"Introducing bothunter: A tiered approach to detection and characterizing automated activity on twitter","author":"beskow","year":"2018","journal-title":"International Conference on Social Computing Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation"},{"key":"ref2","first-page":"1","article-title":"People are strange when youre a stranger: Impact and influence of bots on social networks","volume":"697","author":"aiello","year":"2012","journal-title":"LINKS"},{"key":"ref9","author":"bessi","year":"2016","journal-title":"Social bots distort the 2016 us presidential election online discussion"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.030"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177705148"},{"key":"ref22","article-title":"Exploring network structure, dynamics, and function using networkx","author":"hagberg","year":"2008","journal-title":"Technical Report"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1089\/big.2017.0044"},{"key":"ref24","first-page":"183","article-title":"The ties that torture: Simmelian tie analysis in organizations","volume":"16","author":"krackhardt","year":"1999","journal-title":"Research in the Sociology of Organizations"},{"key":"ref23","article-title":"Bots,# strongerin, and# brexit: Computational propaganda during the uk-eu referendum","author":"howard","year":"2016","journal-title":"Browser Download This Paper"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"ref25","author":"kudugunta","year":"2018","journal-title":"Deep Neural Networks for Bot Detection"}],"event":{"name":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"Barcelona","start":{"date-parts":[[2018,8,28]]},"end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488381\/8508239\/08508322.pdf?arnumber=8508322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:35:59Z","timestamp":1643222159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8508322\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/asonam.2018.8508322","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}