{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:49:19Z","timestamp":1764841759578},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750167","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"83-88","source":"Crossref","is-referenced-by-count":6,"title":["Multidimensional community detection in Twitter"],"prefix":"10.1109","author":[{"given":"Nasser","family":"Zalmout","sequence":"first","affiliation":[]},{"given":"Moustafa","family":"Ghanem","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.2200\/S00298ED1V01Y201009DMK003"},{"journal-title":"Mining the Social Web Community Detection in Twitter and Its Application in Sentiment Analysis","year":"2013","author":"zalmout","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0224-z"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41154-0_5"},{"key":"5","first-page":"1","article-title":"Integrating social media data for community detection","author":"jiliang tang","year":"2011","journal-title":"Modeling and Mining Ubiquitous Social Media"},{"key":"4","first-page":"639","article-title":"Extracting largescale knowledge bases from the web","author":"ravi kumar","year":"1999","journal-title":"Proceedings of the 25th VLDB Conference"},{"key":"9","article-title":"A comparison of extrinsic clustering evaluation metrics based on formal constraints","author":"enrique amigo","year":"2009","journal-title":"Departamento de Lenguajes Sistemas Informaticos UNED"},{"key":"8","article-title":"Social network analysis foundations and frontiers on advantage","author":"ronald burst","year":"2013","journal-title":"Annual Review of Psychology"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750167.pdf?arnumber=6750167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:42:33Z","timestamp":1490308953000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750167\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750167","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}