{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:16:28Z","timestamp":1725516988030},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/isi.2010.5484756","type":"proceedings-article","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T15:18:28Z","timestamp":1277306308000},"page":"147-149","source":"Crossref","is-referenced-by-count":1,"title":["Study of effect of node seniority in social networks"],"prefix":"10.1109","author":[{"given":"Baojun","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Kristinka","family":"Ivanova","sequence":"additional","affiliation":[]},{"given":"John","family":"Yen","sequence":"additional","affiliation":[]},{"family":"Peng Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2007.379553"},{"key":"ref10","article-title":"Locality and Attachedness-based Temporal Social Network Growth Dynamics Analysis","author":"zhang","year":"0","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206791"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401948"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307545100"},{"key":"ref7","article-title":"Homeland security data mining using social network analysis","author":"chen","year":"2008","journal-title":"IEEE-lSI"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150476"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(02)00736-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"}],"event":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","start":{"date-parts":[[2010,5,23]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2010,5,26]]}},"container-title":["2010 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5476380\/5484728\/05484756.pdf?arnumber=5484756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T02:25:25Z","timestamp":1489890325000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5484756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isi.2010.5484756","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}