{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T12:26:48Z","timestamp":1749731208100,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750277","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"619-622","source":"Crossref","is-referenced-by-count":8,"title":["Anomaly detection in Online Social Networks using structure-based technique"],"prefix":"10.1109","author":[{"given":"Abdolazim","family":"Rezaei","sequence":"first","affiliation":[]},{"given":"Zarinah Mohd","family":"Kasirun","sequence":"additional","affiliation":[]},{"given":"Vala Ali","family":"Rohani","sequence":"additional","affiliation":[]},{"given":"Touraj","family":"Khodadadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/978-3-642-31284-7_27","article-title":"Detecting social spam campaigns on twitter","volume":"7341","author":"chu","year":"2012","journal-title":"Applied Cryptography and Network Security"},{"key":"2","article-title":"Detecting fraudulent personalities in networks of online auctioneers","author":"chau","year":"2006","journal-title":"Proceedings of the 10th European Conference on Principle and Practice of Knowledge Discovery in Databases Berlin Germany"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1109\/VAST.2008.4677396","article-title":"Award efficient toolkit integration solving the cell phone calls challenge with the prajna project","author":"swing","year":"2008","journal-title":"Visual Analytics Science and Technology 2008 VAST '08 IEEE Symposium on"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-13672-6_40","article-title":"OddBall spotting anomalies in weighted graphs","author":"akoglu","year":"2010","journal-title":"Proceedings of the 14th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining-Volume Part II Hyderabad India"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775103"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1109\/VAST.2008.4677386","article-title":"Grand challenge award interactive visual analytics palantir the future of analysis","author":"payne","year":"2008","journal-title":"Visual Analytics Science and Technology 2008 VAST '08 IEEE Symposium on"},{"key":"5","article-title":"Neighborhood formation and anomaly detection in bipartite graphs paper presented at the data mining","author":"jimeng","year":"2005","journal-title":"Fifth IEEE International Conference on"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2007.91"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2008.4558601"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920264"},{"key":"12","article-title":"A learning approach to spam detection based on social networks","author":"yeung","year":"2007","journal-title":"Fourth Conference on Email and Anti-Spam"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750277.pdf?arnumber=6750277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:27:39Z","timestamp":1498127259000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750277","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}