{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:16:07Z","timestamp":1775294167267,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/snams.2018.8554675","type":"proceedings-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T20:03:09Z","timestamp":1543867389000},"page":"27-34","source":"Crossref","is-referenced-by-count":11,"title":["Reverse Engineering the Behaviour of Twitter Bots"],"prefix":"10.1109","author":[{"given":"Bello Shehu","family":"Bello","sequence":"first","affiliation":[]},{"given":"Reiko","family":"Heckel","sequence":"additional","affiliation":[]},{"given":"Leandro","family":"Minku","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889360"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964870"},{"key":"ref12","article-title":"Bots,# strongerin, and# brexit: Computational propaganda during the uk-eu referendum","volume":"2798311","author":"howard","year":"2016","journal-title":"Available at SSRN"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v8i1.14550","article-title":"Vader: A parsimonious rule-based model for sentiment analysis of social media text","author":"hutto","year":"2014","journal-title":"Eighth International AAAI Conference on Weblogs and Social Media"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7161(04)24002-0"},{"key":"ref15","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref16","author":"quinlan","year":"2014","journal-title":"C4 5 Programs for Machine Learning"},{"key":"ref17","first-page":"297","article-title":"Detecting and tracking political abuse in social media","volume":"11","author":"ratkiewicz","year":"2011","journal-title":"ICWSM"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-005-6832-7"},{"key":"ref19","year":"0","journal-title":"Chapter 15 make america bot again part one sadbottrue"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.75"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0096"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921650"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/2872518.2889302","article-title":"Botornot: A system to evaluate social bots","author":"davis","year":"2016","journal-title":"Proc International World Wide Web Conference"},{"key":"ref8","author":"ferrara","year":"2014","journal-title":"The Rise of Social Bots"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1282"},{"key":"ref2","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref1","author":"bessi","year":"2016","journal-title":"Social bots distort the 2016 us presidential election online discussion"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/2808797.2809292","article-title":"Reverse engineering socialbot infiltration strategies in twitter","author":"freitas","year":"2015","journal-title":"Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015"},{"key":"ref20","author":"subrahmanian","year":"2016","journal-title":"The DARPA Twitter bot challenge"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"}],"event":{"name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Valencia","start":{"date-parts":[[2018,10,15]]},"end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536820\/8554420\/08554675.pdf?arnumber=8554675","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:34:44Z","timestamp":1775291684000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554675\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/snams.2018.8554675","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}