{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:48:11Z","timestamp":1729619291850,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/isspit.2016.7886022","type":"proceedings-article","created":{"date-parts":[[2017,3,28]],"date-time":"2017-03-28T02:53:28Z","timestamp":1490669608000},"page":"132-137","source":"Crossref","is-referenced-by-count":5,"title":["Early malicious activity discovery in microblogs by social bridges detection"],"prefix":"10.1109","author":[{"given":"Antonia","family":"Gogoglou","sequence":"first","affiliation":[]},{"given":"Zenonas","family":"Theodosiou","sequence":"additional","affiliation":[]},{"given":"Tasos","family":"Kounoudes","sequence":"additional","affiliation":[]},{"given":"Athena","family":"Vakali","sequence":"additional","affiliation":[]},{"given":"Yannis","family":"Manolopoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"161","article-title":"An effective general purpose approach for automated biomedical document classification","author":"cohen","year":"2006","journal-title":"AMIA Annual Symposium Proceedings"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492567"},{"key":"ref12","first-page":"355","article-title":"A comparison of common users across instagram and ask.fm to better understand cyberbullying","author":"hosseinmardi","year":"2014","journal-title":"Proceedings IEEE International Conference on Big Data & Cloud Computing (BdCloud)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18038-0_10"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.051"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2661126.2661133"},{"key":"ref16","first-page":"280","article-title":"Identification and characterization of cyberbullying dynamics in an online social network","author":"squicciarini","year":"2015","journal-title":"Proceedings IEEE\/ACM International Conference on Advances in Social Networks Analysis & Mining (ASONAM)"},{"key":"ref17","first-page":"26","article-title":"Strangers intrusion detection-detecting spammers and fake proles in social networks based on topology anomalies","volume":"1","author":"fire","year":"2012","journal-title":"Human Journal"},{"key":"ref18","first-page":"1458","article-title":"SocialSpamGuard: A data mining-based spam detection system for social media networks","volume":"12","author":"jin","year":"2011","journal-title":"Very Large Data Bases Journal"},{"key":"ref19","first-page":"62","article-title":"Using social network analysis for spam detection","author":"debarr","year":"2010","journal-title":"Pro International Conf Social Computing Behavioral Modeling & Prediction"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(83)90028-X"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.neucom.2015.02.047","article-title":"Detecting spammers on social networks","volume":"159","author":"xianghan","year":"2015","journal-title":"Neurocomputing"},{"key":"ref27","article-title":"The Structure of Complex Networks: Theory and Applications","author":"estrada","year":"2012","journal-title":"Oxford University Press"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0701175104"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2835375"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284092"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2012.6400494"},{"key":"ref1","article-title":"Detection of harassment on web 2.0","author":"yin","year":"2009","journal-title":"Proceedings WWW'2009 Workshop on Content Analysis in the WEB 2 0 (CAW2 0)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0194-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.pse.2016.01.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/0201010"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1609\/icwsm.v4i1.14033","article-title":"Measuring user influence in twitter: The million follower fallacy","author":"cha","year":"2010","journal-title":"Proceedings of 4th International Conference on Weblogs and Social Media (ICWSM)"}],"event":{"name":"2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","start":{"date-parts":[[2016,12,12]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7879518\/7885993\/07886022.pdf?arnumber=7886022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T21:20:12Z","timestamp":1692739212000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7886022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/isspit.2016.7886022","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}