{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:39:23Z","timestamp":1769751563575,"version":"3.49.0"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Control Syst. Lett."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/lcsys.2022.3182291","type":"journal-article","created":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T21:06:01Z","timestamp":1654895161000},"page":"2960-2965","source":"Crossref","is-referenced-by-count":9,"title":["Towards Proactive Moderation of Malicious Content via Bot Detection in Fringe Social Networks"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3186-6195","authenticated-orcid":false,"given":"Chiara","family":"Ravazzi","sequence":"first","affiliation":[{"name":"National Research Council of Italy (CNR-IEIIT), Politecnico di Torino, Institute of Electronics, Computer and Telecommunication Engineering, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0458-2004","authenticated-orcid":false,"given":"Francesco","family":"Malandrino","sequence":"additional","affiliation":[{"name":"National Research Council of Italy (CNR-IEIIT), Politecnico di Torino, Institute of Electronics, Computer and Telecommunication Engineering, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2258-8971","authenticated-orcid":false,"given":"Fabrizio","family":"Dabbene","sequence":"additional","affiliation":[{"name":"National Research Council of Italy (CNR-IEIIT), Politecnico di Torino, Institute of Electronics, Computer and Telecommunication Engineering, Turin, Italy"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2011216118"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2021.2118"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2285509"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1120.0570"},{"key":"ref14","first-page":"1","article-title":"Attitude dynamics with limited verbalisation capabilities","volume":"6","author":"urbig","year":"2003","journal-title":"J Artif Soc Soc Simul"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.05.059"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2017.03.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3182\/20130925-2-DE-4044.00024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.crma.2008.03.014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2781367"},{"key":"ref4","author":"roach","year":"2021","journal-title":"A Macedonian Misinformation Site Dominated Parler Before the Capitol Riot"},{"key":"ref3","year":"2021","journal-title":"A Brand&#x2019;s Guide to Fringe Social Networks"},{"key":"ref6","article-title":"An early look at the Parler online social network","author":"aliapoulios","year":"2021","journal-title":"arXiv 2101 03820"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131390"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113383"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref2","author":"baker","year":"2020","journal-title":"Parler the Social Media Network of Choice for the Proud Boys Says its Activity Tripled During the Debate Where Trump Mentioned the Group"},{"key":"ref1","author":"constine","year":"2017","journal-title":"Facebook Bans Monetization of Violence Porn Drugs Hate"},{"key":"ref9","article-title":"Botometer 101: Social bot practicum for computational social scientists","author":"yang","year":"2022","journal-title":"arXiv 2201 01608"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00365-007-9003-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2021.3092810"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3056362"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.2943225"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2393637"}],"container-title":["IEEE Control Systems Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7782633\/9462165\/09794298.pdf?arnumber=9794298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T21:53:10Z","timestamp":1667512390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9794298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/lcsys.2022.3182291","relation":{},"ISSN":["2475-1456"],"issn-type":[{"value":"2475-1456","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}