{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:25:54Z","timestamp":1729628754438,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578852","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"327-329","source":"Crossref","is-referenced-by-count":0,"title":["Capturing signatures of anomalous behavior in online social networks"],"prefix":"10.1109","author":[{"given":"Arun V.","family":"Sathanur","sequence":"first","affiliation":[]},{"given":"Vikram","family":"Jandhyala","sequence":"additional","affiliation":[]},{"given":"Chuanjia","family":"Xing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.70"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1137\/1037127"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1086\/229694"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976735"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/APS.2012.6347958"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1145\/1718487.1718520","article-title":"TwitterRank: Finding topicsensitive influential twitterers","author":"weng","year":"2010","journal-title":"Proc 3rd ACM International Conference on Web Search and Data Mining"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284103"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1080\/14747731.2011.621287"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.5153\/sro.2553"},{"key":"10","article-title":"TURank: Twitter user ranking based on user-tweet graph analysis","author":"yamaguchi","year":"2010","journal-title":"Proc Web Information Systems Engineering"},{"key":"7","article-title":"Social network analysis as an approach to combat terrorism: Past, present, and future research","volume":"2","author":"ressler","year":"2006","journal-title":"Homeland Security Affairs"},{"key":"6","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/11427995_19","article-title":"Beyond keyword filtering for message and conversation detection","volume":"3495","author":"skillicorn","year":"2005","journal-title":"Springer Lecture Notes in Computer Science Intelligence and Security Informatics"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971643"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284095"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.14778\/1929861.1929864"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578852.pdf?arnumber=6578852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T20:53:16Z","timestamp":1498078396000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578852\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578852","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}