{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:18Z","timestamp":1750221198149,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,21]],"date-time":"2018-05-21T00:00:00Z","timestamp":1526860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,21]]},"DOI":"10.1145\/3230467.3230475","type":"proceedings-article","created":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T12:38:13Z","timestamp":1536064693000},"page":"50-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Recognition Based Mechanism to Detect Malicious Content in Social Networks"],"prefix":"10.1145","author":[{"given":"Fatna","family":"Elmendili","sequence":"first","affiliation":[{"name":"Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences"}]},{"given":"Habiba","family":"Chaoui","sequence":"additional","affiliation":[{"name":"Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences"}]},{"given":"Youn\u00e8s El Bouzekri","family":"El Idrissi","sequence":"additional","affiliation":[{"name":"Computer Sciences Systems, Engineering Laboratory National, School of Applied Sciences"}]}],"member":"320","published-online":{"date-parts":[[2018,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Cheng Cao and James Caverlee Detecting Spam URLs in Social Media via Behavioral Analysis Springer International Publishing Switzerland 2015.  Cheng Cao and James Caverlee Detecting Spam URLs in Social Media via Behavioral Analysis Springer International Publishing Switzerland 2015.","DOI":"10.1007\/978-3-319-16354-3_77"},{"key":"e_1_3_2_1_2_1","unstructured":"M. Sai Sri Lakshmi Yellari M. Manisha J. Dhanesh M. Srinivasa Rao IDENTIFYING MALICIOUS DATA IN SOCIAL MEDIA International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017.  M. Sai Sri Lakshmi Yellari M. Manisha J. Dhanesh M. Srinivasa Rao IDENTIFYING MALICIOUS DATA IN SOCIAL MEDIA International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017."},{"volume-title":"LLC","year":"2011","author":"Lops Pasquale","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Prateek Dewan Ponnurangam Kumaraguru Detecting Malicious Content on Facebook Copyright c 2015.  Prateek Dewan Ponnurangam Kumaraguru Detecting Malicious Content on Facebook Copyright c 2015."},{"key":"e_1_3_2_1_5_1","unstructured":"Divya 2Dr. Kulvinder Singh 3Dr. Sanjeev Dhawan Threshold Based Mechanism to Detect Malicious URL's in Social Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661 p-ISSN: 2278-8727.  Divya 2Dr. Kulvinder Singh 3Dr. Sanjeev Dhawan Threshold Based Mechanism to Detect Malicious URL's in Social Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661 p-ISSN: 2278-8727."},{"key":"e_1_3_2_1_6_1","unstructured":"Vidya Dhamdhere Sheetal Gund Tejaswini Zade Radhika Tiwari Ashish Salunkhe5 Survey on Malicious.  Vidya Dhamdhere Sheetal Gund Tejaswini Zade Radhika Tiwari Ashish Salunkhe5 Survey on Malicious."},{"key":"e_1_3_2_1_7_1","unstructured":"Application Detection on Social Network International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 4 Issue 9 September 2016.  Application Detection on Social Network International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 4 Issue 9 September 2016."},{"issue":"10","key":"e_1_3_2_1_8_1","first-page":"2135","volume":"10","author":"Soman Saini Jacob","year":"2014","journal-title":"A STUDY OF SPAM DETECTION ALGORITHM ON SOCIAL MEDIA NETWORKS, Journal of Computer Science"},{"key":"e_1_3_2_1_9_1","unstructured":"Neeraja M John Prakash Detecting Malicious Posts in Social Networks Using Text Analysis International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013):  6.14 | Impact Factor (2015): 6.391.  Neeraja M John Prakash Detecting Malicious Posts in Social Networks Using Text Analysis International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2015): 6.391."},{"key":"e_1_3_2_1_10_1","unstructured":"Qiang Cao Understanding and Defending against Malicious Identities in Online Social Networks Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2014.  Qiang Cao Understanding and Defending against Malicious Identities in Online Social Networks Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2014."}],"event":{"name":"ICEMC '18: 2018 International Conference on E-business and Mobile Commerce","acronym":"ICEMC '18","location":"Chengdu China"},"container-title":["Proceedings of the 2018 International Conference on E-business and Mobile Commerce"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230467.3230475","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230467.3230475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:23Z","timestamp":1750210763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230467.3230475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,21]]},"references-count":10,"alternative-id":["10.1145\/3230467.3230475","10.1145\/3230467"],"URL":"https:\/\/doi.org\/10.1145\/3230467.3230475","relation":{},"subject":[],"published":{"date-parts":[[2018,5,21]]},"assertion":[{"value":"2018-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}