{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:06:47Z","timestamp":1764688007021,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1109\/isdfs55398.2022.9800840","type":"proceedings-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T19:52:11Z","timestamp":1655927531000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Arabic YouTube Spam Using Data Mining Techniques"],"prefix":"10.1109","author":[{"given":"Yahya","family":"Tashtoush","sequence":"first","affiliation":[{"name":"Jordan University of Science and Technology,Department of Computer Science,Jordan"}]},{"given":"Areen","family":"Magableh","sequence":"additional","affiliation":[{"name":"Jordan University of Science and Technology,Department of Computer Science,Jordan"}]},{"given":"Omar","family":"Darwish","sequence":"additional","affiliation":[{"name":"Eastern Michigan University,Information Security and Applied Computing,USA"}]},{"given":"Lujain","family":"Smadi","sequence":"additional","affiliation":[{"name":"Jordan University of Science and Technology,Department of Computer Science,Jordan"}]},{"given":"Omar","family":"Alomari","sequence":"additional","affiliation":[{"name":"Jordan University of Science and Technology,Department of Computer Science,Jordan"}]},{"given":"Anood","family":"ALghazoo","sequence":"additional","affiliation":[{"name":"Jordan University of Science and Technology,Department of Computer Science,Jordan"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.5815\/ijisa.2013.01.03"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.14778\/3402755.3402795"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.4018\/ijeei.2013100104"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.3390\/fi13010019"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.3390\/a9020027"},{"key":"ref15","first-page":"12215","article-title":"Analysis of Student Learning Experience by Mining Social Media Data","volume":"5","author":"pande","year":"2017","journal-title":"International Journal of Computational Engineering Science"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/IACS.2014.6841964"},{"key":"ref17","article-title":"A Brief Survey of Text Mining: Classification","author":"allahyari","year":"2017","journal-title":"Clustering and Extraction Techniques[J]"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2723576.2723584"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.4018\/jdwm.2007070101"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1920261.1920263"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ISDFS.2018.8355315"},{"key":"ref6","first-page":"138","article-title":"TubeSpam: Comment spam filtering on YouTube","author":"alberto","year":"2016","journal-title":"Proc - 2015 IEEE 14th Int Conf Mach Learn Appl ICMLA 2015"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1186\/s40537-015-0029-9"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICMLA.2015.37"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.7763\/IJKE.2015.V1.19"},{"key":"ref2","article-title":"Feature Selection for Comment Spam Filtering on YouTube","volume":"1","author":"uysal","year":"2018","journal-title":"Data Science and Applications"},{"year":"0","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICDIPC.2016.7470791"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1080\/01431160412331269698"},{"key":"ref22","first-page":"45","article-title":"Support Vector Machine Active Learning with Applications to Text Classification","author":"tong","year":"2001","journal-title":"JMLR"},{"key":"ref21","first-page":"145","article-title":"Editing training data for multi-label classification with the k-nearest neighbor rule","volume":"1","author":"kanj","year":"2015","journal-title":"Pattern Analysis and Applications"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.5121\/ijaia.2017.8601"},{"key":"ref23","first-page":"415","article-title":"Relaxed online SVMs for spam filtering","author":"sculley","year":"2007","journal-title":"Proceedings of the 20th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR 9"}],"event":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2022,6,6]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2022,6,7]]}},"container-title":["2022 10th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9800750\/9800752\/09800840.pdf?arnumber=9800840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:57:40Z","timestamp":1686592660000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9800840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/isdfs55398.2022.9800840","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]}}}