{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:15Z","timestamp":1750308615687,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,26]],"date-time":"2017-02-26T00:00:00Z","timestamp":1488067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Universitas Brawijaya","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,26]]},"DOI":"10.1145\/3056662.3056704","type":"proceedings-article","created":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T15:09:30Z","timestamp":1493651370000},"page":"77-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Spam detection framework for Android Twitter application using Na\u00efve Bayes and K-Nearest Neighbor classifiers"],"prefix":"10.1145","author":[{"given":"Aryo","family":"Pinandito","sequence":"first","affiliation":[{"name":"Universitas Brawijaya, Malang, East Java, Indonesia"}]},{"given":"Rizal Setya","family":"Perdana","sequence":"additional","affiliation":[{"name":"Universitas Brawijaya, Malang, East Java, Indonesia"}]},{"given":"Mochamad Chandra","family":"Saputra","sequence":"additional","affiliation":[{"name":"Universitas Brawijaya, Malang, East Java, Indonesia"}]},{"given":"Hanifah Muslimah","family":"Az-zahra","sequence":"additional","affiliation":[{"name":"Universitas Brawijaya, Malang, East Java, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2017,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Maria Ivancin and Nina Kjarval","author":"Rosenstiel Tom","year":"2015","unstructured":"Tom Rosenstiel , Jeff Sonderman , Kevin Loker , Maria Ivancin and Nina Kjarval . 2015 . Twitter And The News: How People Use The Social Network to Learn About The World. (September 2015). Retrieved Oct 5, 2015 from https:\/\/www.americanpressinstitute.org\/publications\/reports\/survey-research\/how-people-use-twitter-news\/ Tom Rosenstiel, Jeff Sonderman, Kevin Loker, Maria Ivancin and Nina Kjarval. 2015. Twitter And The News: How People Use The Social Network to Learn About The World. (September 2015). Retrieved Oct 5, 2015 from https:\/\/www.americanpressinstitute.org\/publications\/reports\/survey-research\/how-people-use-twitter-news\/"},{"key":"e_1_3_2_1_2_1","volume-title":"News Use Across Social Media Platforms","author":"Gottfried Jeffrey","year":"2016","unstructured":"Jeffrey Gottfried and Elisa Shearer . 2016. News Use Across Social Media Platforms 2016 . (May 2016). Retrieved Oct 5, 2015. http:\/\/www.journalism.org\/2016\/05\/26\/news-use-across-social-media-platforms-2016\/ Jeffrey Gottfried and Elisa Shearer. 2016. News Use Across Social Media Platforms 2016. (May 2016). Retrieved Oct 5, 2015. http:\/\/www.journalism.org\/2016\/05\/26\/news-use-across-social-media-platforms-2016\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.58"},{"key":"e_1_3_2_1_4_1","volume-title":"Global Social Media Trends","author":"Arno Christian","year":"2013","unstructured":"Christian Arno . 2013. Global Social Media Trends in 2013 . (Februari 2013). Retrieved Oct 5, 2015 from https:\/\/searchenginewatch.com\/sew\/how-to\/2242467\/global-social-media-trends-in-2013 Christian Arno. 2013. Global Social Media Trends in 2013. (Februari 2013). Retrieved Oct 5, 2015 from https:\/\/searchenginewatch.com\/sew\/how-to\/2242467\/global-social-media-trends-in-2013"},{"key":"e_1_3_2_1_5_1","volume-title":"How Dirty is Big Data?","author":"Insights Networked","year":"2015","unstructured":"Networked Insights . 2015. How Dirty is Big Data? . March 2015 . Retrieved Oct 5, 2015 from http:\/\/info.networkedinsights.com\/Dirty-Data-LP.html Networked Insights. 2015. How Dirty is Big Data?. March 2015. Retrieved Oct 5, 2015 from http:\/\/info.networkedinsights.com\/Dirty-Data-LP.html"},{"volume-title":"Anti-Spam Measures: Analysis and Design","author":"Schryen Guido","key":"e_1_3_2_1_6_1","unstructured":"Guido Schryen . 2007. Anti-Spam Measures: Analysis and Design . Springer-Verlag , Heidelberg . Guido Schryen. 2007. Anti-Spam Measures: Analysis and Design. Springer-Verlag, Heidelberg."},{"key":"e_1_3_2_1_7_1","volume-title":"Retrieved","author":"Barry Christine","year":"2013","unstructured":"Christine Barry . 2013 . Ham v Spam: what's the difference? (October 2013) . Retrieved December 12, 2016 from https:\/\/www.barracuda.com\/blogs\/pmblog?bid=2152#.WGpQuVV97Dc Christine Barry. 2013. Ham v Spam: what's the difference? (October 2013). Retrieved December 12, 2016 from https:\/\/www.barracuda.com\/blogs\/pmblog?bid=2152#.WGpQuVV97Dc"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2014.6996188"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.02.047"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2015.208"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102418"},{"volume-title":"Implementation Of Prototype to Detect Spam In YouTube Using The Application TubeKit And Na\u00efve Bayes Algorithm. Graduate Project Report. Texas A&M University","author":"Gandra Srilaxmi","key":"e_1_3_2_1_12_1","unstructured":"Srilaxmi Gandra . 2014. Implementation Of Prototype to Detect Spam In YouTube Using The Application TubeKit And Na\u00efve Bayes Algorithm. Graduate Project Report. Texas A&M University , Corpus Christi, TX . Srilaxmi Gandra. 2014. Implementation Of Prototype to Detect Spam In YouTube Using The Application TubeKit And Na\u00efve Bayes Algorithm. Graduate Project Report. Texas A&M University, Corpus Christi, TX."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2014.03.129"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"Developers Android","year":"2016","unstructured":"Android Developers . 2016 . Activity (Android Reference) . Retrieved Sep 23, 2016 from https:\/\/developer.android.com\/reference\/android\/app\/Activity.html Android Developers. 2016. Activity (Android Reference). Retrieved Sep 23, 2016 from https:\/\/developer.android.com\/reference\/android\/app\/Activity.html"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btt769"},{"key":"e_1_3_2_1_16_1","article-title":"Do we Need Hundreds of Classifiers to Solve Real World Classification Problems","author":"Fern\u00e1ndez-Delgado Manuel","year":"2014","unstructured":"Manuel Fern\u00e1ndez-Delgado , Eva Cernadas , Sen\u00e9n Barro , Dinani Amorim . 2014 . Do we Need Hundreds of Classifiers to Solve Real World Classification Problems ? Journal of Machine Learning Research 15 ( Oct. 2014). 3133--3181. Manuel Fern\u00e1ndez-Delgado, Eva Cernadas, Sen\u00e9n Barro, Dinani Amorim. 2014. Do we Need Hundreds of Classifiers to Solve Real World Classification Problems? Journal of Machine Learning Research 15 (Oct. 2014). 3133--3181.","journal-title":"Journal of Machine Learning Research 15"}],"event":{"name":"ICSCA 2017: 2017 6th International Conference on Software and Computer Applications","acronym":"ICSCA 2017","location":"Bangkok Thailand"},"container-title":["Proceedings of the 6th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3056662.3056704","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3056662.3056704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:31Z","timestamp":1750273651000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3056662.3056704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,26]]},"references-count":16,"alternative-id":["10.1145\/3056662.3056704","10.1145\/3056662"],"URL":"https:\/\/doi.org\/10.1145\/3056662.3056704","relation":{},"subject":[],"published":{"date-parts":[[2017,2,26]]},"assertion":[{"value":"2017-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}