{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:37:42Z","timestamp":1729665462414,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/indin.2009.5195918","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T19:32:36Z","timestamp":1250019156000},"page":"875-880","source":"Crossref","is-referenced-by-count":20,"title":["Toward spam 2.0: An evaluation of Web 2.0 anti-spam methods"],"prefix":"10.1109","author":[{"given":"Pedram","family":"Hayati","sequence":"first","affiliation":[]},{"given":"Vidyasagar","family":"Potdar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"svms for the blogosphere: blog identification and splog detection","author":"kolari","year":"2006","journal-title":"AAAI Spring Symposium on Computational Approaches to Analysing Weblogs"},{"key":"17","article-title":"collaborative blog spam filtering using adaptive percolation search","author":"han","year":"2006","journal-title":"InWWW 2006 Workshop on Weblogging Ecosystem Aggregation Analysis and Dynamics"},{"key":"18","article-title":"detecting blog spams using the vocabulary size of all substrings in their copies","author":"narisawa","year":"2006","journal-title":"WWE 2006 3rd Annual Workshop on the Weblogging Ecosystem"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2004.1279198"},{"key":"16","article-title":"blocking blog spam with language model disagreement","author":"mishne","year":"2005","journal-title":"Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb"},{"journal-title":"Wiki Spam","year":"2008","key":"13"},{"key":"14","article-title":"evaluation of spam detection and prevention frameworks for email and image spam - a state of art","author":"hayati","year":"2008","journal-title":"The 2nd International Workshop on Applications of Information Integration in Digital Ecosystems (AIIDE 2008)"},{"key":"11","article-title":"social honeypots: making friends with a spammer near you","author":"webb","year":"2008","journal-title":"Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS 2008)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1451983.1451996"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277813"},{"key":"20","article-title":"detecting spam blogs: a machine learning approach","author":"kolari","year":"2006","journal-title":"Proceedings of the 21st National Conference on Artificial Intelligence (AAAI 2006)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.21"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2008.4664407"},{"key":"24","article-title":"is britney spears spam","author":"zinman","year":"2007","journal-title":"Fourth Conference on Email and Anti-Spam"},{"key":"25","article-title":"combating spam in tagging systems","author":"georgia","year":"2007","journal-title":"Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web Banff"},{"key":"3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MIC.2007.125","article-title":"fighting spam on social web sites: a survey of approaches and future challenges","volume":"11","author":"paul","year":"2007","journal-title":"IEEE Internet Computing"},{"key":"2","article-title":"web spam taxonomy","author":"gyongyi","year":"2005","journal-title":"Proceedings of the 1st International Workshop on Adversarial Information Retrieval on the Web"},{"key":"10","article-title":"opinion spam and analysis","author":"nitin","year":"2008","journal-title":"Proceedings of the International Conference on Web Search and Web Data Mining Palo Alto"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2003.10.001"},{"key":"7","article-title":"characterizing the splogosphere","author":"kolari","year":"2006","journal-title":"Proceedings of the 3rd Annual Workshop on the Weblogging Ecosystem"},{"key":"6","article-title":"splog detection using self-similarity analysis on blog temporal dynamics","author":"yu-ru","year":"2007","journal-title":"Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web Banff"},{"journal-title":"What Is Web 2 0","year":"2005","author":"o'reilly","key":"5"},{"journal-title":"Latest Spam Statistics","year":"2008","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.68"},{"key":"8","first-page":"723","article-title":"detecting search engine spam from a trackback network in blogspace","author":"kimura","year":"2005","journal-title":"Knowledge-Based Intelligent Information and Engineering Systems"}],"event":{"name":"2009 7th IEEE International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2009,6,23]]},"location":"Cardiff, Wales, UK","end":{"date-parts":[[2009,6,26]]}},"container-title":["2009 7th IEEE International Conference on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5175248\/5191764\/05195918.pdf?arnumber=5195918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:44:12Z","timestamp":1497825852000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5195918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/indin.2009.5195918","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}