{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:56:18Z","timestamp":1760597778899,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T00:00:00Z","timestamp":1512604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,7]]},"DOI":"10.1145\/3155133.3155157","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T13:26:53Z","timestamp":1512998813000},"page":"262-269","source":"Crossref","is-referenced-by-count":19,"title":["Limiting the Spread of Epidemics within Time Constraint on Online Social Networks"],"prefix":"10.1145","author":[{"given":"Canh V.","family":"Pham","sequence":"first","affiliation":[{"name":"University of Engineering and Technology, Vietnam National University, Hanoi, Vietnam, People's Security Academy, Hanoi, Vietnam"}]},{"given":"Hoang M.","family":"Dinh","sequence":"additional","affiliation":[{"name":"People's Security Academy, Hanoi, Vietnam"}]},{"given":"Hoa D.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"People's Security Academy, Hanoi, Vietnam"}]},{"given":"Huyen T.","family":"Dang","sequence":"additional","affiliation":[{"name":"People's Security Academy, Hanoi, Vietnam"}]},{"given":"Huan X.","family":"Hoang","sequence":"additional","affiliation":[{"name":"University of Engineering and Technology, Vietnam National University, Hanoi, Vietnam, Hanoi, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526806"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835934"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.118"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2005.11.029"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.132"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623704"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89197-0_94"},{"key":"e_1_3_2_1_11_1","unstructured":"M. Kimura K. Saito and H. Motoda. 2009. Blocking links to minimize contamination spread in a social network. ACM Transactions on Knowledge Discovery from Data (TKDD) 3 2 (April 2009) 795--825. 10.1145\/1514888.1514892   M. Kimura K. Saito and H. Motoda. 2009. Blocking links to minimize contamination spread in a social network. ACM Transactions on Knowledge Discovery from Data (TKDD) 3 2 (April 2009) 795--825. 10.1145\/1514888.1514892"},{"key":"e_1_3_2_1_12_1","unstructured":"Ivana Kottasov\u00c3\u0105. 2017. Facebook targets 30 000 fake accounts in France. http:\/\/money.cnn.com\/2017\/04\/14\/media\/facebook-fake-news-france-election\/index.html  Ivana Kottasov\u00c3\u0105. 2017. Facebook targets 30 000 fake accounts in France. http:\/\/money.cnn.com\/2017\/04\/14\/media\/facebook-fake-news-france-election\/index.html"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sejeong Kwon Meeyoung Cha Kyomin Jung Wei Chen and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In Proceeding of IEEE 13th International Conference on Data Mining Hui Xiong George Karypis Bhavani Thuraisingham Diane Cook and Xindong Wu (Eds.). Institute of Electrical and Electronics Engineers ( IEEE ) Dallas Texas US 1103--1109.  Sejeong Kwon Meeyoung Cha Kyomin Jung Wei Chen and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In Proceeding of IEEE 13th International Conference on Data Mining Hui Xiong George Karypis Bhavani Thuraisingham Diane Cook and Xindong Wu (Eds.). Institute of Electrical and Electronics Engineers ( IEEE ) Dallas Texas US 1103--1109.","DOI":"10.1109\/ICDM.2013.61"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232722.1232727"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232722.1232727"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129177"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.158"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-011-9393-3"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"D. T. Nguyen N. P. Nguyen and M. T. Thai. 2012. Sources of Misinformation in Online Social Networks: Who to Suspect?. In MILITARY COMMUNICATIONS CONFERENCE(MILCOM 2012). Institute of Electrical and Electronics Engineers ( IEEE ) Orlando FL USA 1--6.  D. T. Nguyen N. P. Nguyen and M. T. Thai. 2012. Sources of Misinformation in Online Social Networks: Who to Suspect?. In MILITARY COMMUNICATIONS CONFERENCE(MILCOM 2012). Institute of Electrical and Electronics Engineers ( IEEE ) Orlando FL USA 1--6.","DOI":"10.1109\/MILCOM.2012.6415780"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.002"},{"volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing, Reginald N. Smythe and Alexander Noble (Eds.). Association for Computational Linguistics","year":"2011","author":"Qazvinian Vahed","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Vijay V. Vazirani. 2001. Approximation Algorithms. Springer Verlag New York Inc. New York NY USA.   Vijay V. Vazirani. 2001. Approximation Algorithms. Springer Verlag New York Inc. New York NY USA."},{"key":"e_1_3_2_1_25_1","unstructured":"Danny Yadron. 2017. Twitter deletes 125 000 Isis accounts and expands anti-terror teams. https:\/\/www.theguardian.com\/technology\/2016\/feb\/05\/twitter-deletes-isis-accounts-terrorism-online  Danny Yadron. 2017. Twitter deletes 125 000 Isis accounts and expands anti-terror teams. https:\/\/www.theguardian.com\/technology\/2016\/feb\/05\/twitter-deletes-isis-accounts-terrorism-online"},{"key":"e_1_3_2_1_26_1","unstructured":"H. Zhang M. Alim X. Li M. T. Thai and H. Nguyen. 2014. Misinformation in Online Social Networks: Catch Them All with Limited Budget. In ACM Transactions on Information Systems (TOIS) 2016. ACM Shanghai China 1719--1728. 10.1145\/2885494   H. Zhang M. Alim X. Li M. T. Thai and H. Nguyen. 2014. Misinformation in Online Social Networks: Catch Them All with Limited Budget. In ACM Transactions on Information Systems (TOIS) 2016. ACM Shanghai China 1719--1728. 10.1145\/2885494"},{"volume-title":"Proceedings of the 4th International Conference on Computational Social Networks (CSoNet). Springer","author":"Zhang H.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Y. Zhang and B. Prakash. Dava. 2015. Data-Aware Vaccine Allocation Over Large Networks. ACM Transactions on Knowledge Discovery from Data 10 2 (October 2015) 291--301. 10.1145\/2803176   Y. Zhang and B. Prakash. Dava. 2015. Data-Aware Vaccine Allocation Over Large Networks. ACM Transactions on Knowledge Discovery from Data 10 2 (October 2015) 291--301. 10.1145\/2803176"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2662088"}],"event":{"name":"SoICT 2017: The Eighth International Symposium on Information and Communication Technology","sponsor":["SOICT School of Information and Communication Technology - HUST","NAFOSTED The National Foundation for Science and Technology Development"],"location":"Nha Trang City Viet Nam","acronym":"SoICT 2017"},"container-title":["Proceedings of the Eighth International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155157","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3155133.3155157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:28Z","timestamp":1750217428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,7]]},"references-count":29,"alternative-id":["10.1145\/3155133.3155157","10.1145\/3155133"],"URL":"https:\/\/doi.org\/10.1145\/3155133.3155157","relation":{},"subject":[],"published":{"date-parts":[[2017,12,7]]}}}