{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:10:09Z","timestamp":1750205409031,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3314200","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"7-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Identification of the Source(s) of Misinformation Propagation Utilizing Identifying Codes"],"prefix":"10.1145","author":[{"given":"Kaustav","family":"Basu","sequence":"first","affiliation":[{"name":"Arizona State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37210-0_48"},{"key":"e_1_3_2_1_2_1","volume-title":"Health Monitoring of Critical Power System Equipments Using Identifying Codes. In International Conference on Critical Information Infrastructures Security. Springer, 29\u201341","author":"Basu Kaustav","year":"2018","unstructured":"Kaustav Basu , Malhar Padhee , Sohini Roy , Anamitra Pal , Arunabha Sen , Matthew Rhodes , and Brian Keel . 2018 . Health Monitoring of Critical Power System Equipments Using Identifying Codes. In International Conference on Critical Information Infrastructures Security. Springer, 29\u201341 . Kaustav Basu, Malhar Padhee, Sohini Roy, Anamitra Pal, Arunabha Sen, Matthew Rhodes, and Brian Keel. 2018. Health Monitoring of Critical Power System Equipments Using Identifying Codes. In International Conference on Critical Information Infrastructures Security. Springer, 29\u201341."},{"key":"e_1_3_2_1_3_1","unstructured":"Kaustav Basu Chenyang Zhou Arunabha Sen and Victoria\u00a0Horan Goliber. 2019. A Novel Graph Analytic Approach to Monitor Terrorist Networks. arXiv preprint arXiv:1902.02836(2019).  Kaustav Basu Chenyang Zhou Arunabha Sen and Victoria\u00a0Horan Goliber. 2019. A Novel Graph Analytic Approach to Monitor Terrorist Networks. arXiv preprint arXiv:1902.02836(2019)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00536-4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0128193"},{"key":"e_1_3_2_1_6_1","unstructured":"Mehrdad Farajtabar Jiachen Yang Xiaojing Ye Huan Xu Rakshit Trivedi Elias Khalil Shuang Li Le Song and Hongyuan Zha. 2017. Fake news mitigation via point process based intervention. arXiv preprint arXiv:1703.07823(2017).   Mehrdad Farajtabar Jiachen Yang Xiaojing Ye Huan Xu Rakshit Trivedi Elias Khalil Shuang Li Le Song and Hongyuan Zha. 2017. Fake news mitigation via point process based intervention. arXiv preprint arXiv:1703.07823(2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.661507"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928263"},{"key":"e_1_3_2_1_9_1","unstructured":"Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data.  Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http:\/\/snap.stanford.edu\/data."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208941"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3288599.3288632"},{"volume-title":"International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation","author":"Sen Arunabha","key":"e_1_3_2_1_12_1","unstructured":"Arunabha Sen , Victoria\u00a0Horan Goliber , Chenyang Zhou , and Kaustav Basu . 2018. Terrorist Network Monitoring with Identifying Code . In International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation . Springer , 329\u2013339. Arunabha Sen, Victoria\u00a0Horan Goliber, Chenyang Zhou, and Kaustav Basu. 2018. Terrorist Network Monitoring with Identifying Code. In International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation. Springer, 329\u2013339."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889354"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2018.00092"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2007.02.001"},{"key":"e_1_3_2_1_17_1","unstructured":"Eugenio Tacchini Gabriele Ballarin Marco\u00a0L Della\u00a0Vedova Stefano Moret and Luca de Alfaro. 2017. Some like it hoax: Automated fake news detection in social networks. arXiv preprint arXiv:1704.07506(2017).  Eugenio Tacchini Gabriele Ballarin Marco\u00a0L Della\u00a0Vedova Stefano Moret and Luca de Alfaro. 2017. Some like it hoax: Automated fake news detection in social networks. arXiv preprint arXiv:1704.07506(2017)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11809678_31"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3314200","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3314200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:23Z","timestamp":1750204403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3314200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":18,"alternative-id":["10.1145\/3308560.3314200","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3314200","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}