{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:16:03Z","timestamp":1775294163577,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/snams.2018.8554898","type":"proceedings-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T20:03:09Z","timestamp":1543867389000},"page":"64-71","source":"Crossref","is-referenced-by-count":4,"title":["Trollslayer: Crowdsourcing and Characterization of Abusive Birds in Twitter"],"prefix":"10.1109","author":[{"given":"Alvaro","family":"Garcia-Recuero","sequence":"first","affiliation":[]},{"given":"Aneta","family":"Morawin","sequence":"additional","affiliation":[]},{"given":"Gareth","family":"Tyson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"randolph","year":"2005","journal-title":"Free-marginal multirater kappa (multirater k [free]) An alternative to fleiss' fixed-marginal multirater kappa"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/001316448104100307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11634-010-0073-4"},{"key":"ref13","author":"dubs","year":"0","journal-title":"Google's official list of badwords"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"327","DOI":"10.3233\/AIC-130564","article-title":"Detection of dishonest behaviors in on-line networks using graph-based ranking techniques","volume":"26","author":"ortega","year":"2013","journal-title":"AI communications"},{"key":"ref15","first-page":"419","article-title":"Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying","volume":"239","author":"galan-garcia","year":"2014","journal-title":"International Joint Conference SOCO&#x2019; 13-CISIS&#x2019; 13-ICEUTE&#x2019; 13 ser Advances in Intelligent Systems and Computing"},{"key":"ref16","first-page":"15","article-title":"Aiding the detection of fake accounts in large scale social online services","author":"cao","year":"2012","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation Ser NSDI'12"},{"key":"ref17","article-title":"Thwarting fake osn accounts by predicting their victims","author":"boshmaf","year":"2015","journal-title":"Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security (AI-Sec)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1145\/2872518.2888600","article-title":"Discouraging abusive behavior in privacy-preserving online social networking applications","author":"garcia-recuero","year":"2016","journal-title":"Proceedings of 20th International Conference Companion on World Wide Web"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23260"},{"key":"ref4","author":"isaac","year":"2016","journal-title":"Twitter Steps Up Efforts to Thwart Terrorists' Tweets"},{"key":"ref27","year":"0","journal-title":"Detecting insults in social commentary"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"ref8","author":"assembly","year":"0","journal-title":"Universal declaration of human rights 10 december 1948 217 a (iii"},{"key":"ref7","author":"jackson","year":"0","journal-title":"French court orders twitter to reveal racists' details"},{"key":"ref2","first-page":"4:1","article-title":"Manipulation and abuse on social media","author":"ferrara","year":"2015","journal-title":"SIGWEB Newsletter"},{"key":"ref9","author":"news","year":"0"},{"key":"ref1","author":"mandeep","year":"2011","journal-title":"Behavioural Science Support for JTRIG's Effects and Online HUMINT Operations"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"ref22","author":"wu","year":"2016","journal-title":"Slangsd Building and using a sentiment dictionary of slang words for short-text sentiment classification"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742760"},{"key":"ref24","first-page":"30","article-title":"Measuring user influence in twitter: The million follower fallacy","volume":"10","author":"cha","year":"2010","journal-title":"ICWSM"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1609\/icwsm.v4i1.14024","article-title":"How does the data sampling strategy impact the discovery of information diffusion in social media?","volume":"10","author":"de choudhury","year":"2010","journal-title":"ICWSM"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2413247.2413260"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"}],"event":{"name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Valencia","start":{"date-parts":[[2018,10,15]]},"end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536820\/8554420\/08554898.pdf?arnumber=8554898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:34:45Z","timestamp":1775291685000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/snams.2018.8554898","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}