{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T15:04:34Z","timestamp":1760367874071,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,7]]},"DOI":"10.1145\/3466933.3466973","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T14:08:32Z","timestamp":1625753312000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Methods and Challenges in Social Bots Detection: A Systematic Review"],"prefix":"10.1145","author":[{"given":"Daniel Marques Gomes","family":"de Morais","sequence":"first","affiliation":[{"name":"University of Sao Paulo"}]},{"given":"Luciano Antonio","family":"Digiampietri","sequence":"additional","affiliation":[{"name":"University of Sao Paulo"}]}],"member":"320","published-online":{"date-parts":[[2021,7,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316504"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04689-y"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2014.81"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316500"},{"volume-title":"Emotional Bots: Content-based Spammer Detection on Social Media. In 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE","year":"2018","author":"Andriotis P.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297486"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09290-1"},{"volume-title":"Analysis of Arabic Bot Behaviors. In 2018 21st Saudi Computer Society National Computer Conference (NCC). IEEE","year":"2018","author":"Boreggah B.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004887"},{"volume-title":"Detection of Bots and Cyborgs in Twitter: A Study on the Chilean Presidential Election","year":"2017","author":"Castillo Samara","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0096"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291010"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"e_1_3_2_1_15_1","first-page":"4","article-title":"Social Fingerprinting: Detection of Spambot Groups Through DNA-Inspired Behavioral Modeling","volume":"15","author":"Cresci S.","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBRC.2014.36"},{"volume-title":"Artificial Intelligence Methods in Intelligent Algorithms","author":"Daouadi Kheir\u00a0Eddine","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3191835.3191957"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"A. Dorri M. Abadi and M. Dadfarnia. 2018. SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification. In 2018 IEEE 16th Intl Conf on Dependable Autonomic and Secure Computing 16th Intl Conf on Pervasive Intelligence and Computing 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech). IEEE New York New Yourk USA 496\u2013503. https:\/\/doi.org\/10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00097  A. Dorri M. Abadi and M. Dadfarnia. 2018. SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification. In 2018 IEEE 16th Intl Conf on Dependable Autonomic and Secure Computing 16th Intl Conf on Pervasive Intelligence and Computing 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech). IEEE New York New Yourk USA 496\u2013503. https:\/\/doi.org\/10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00097","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00097"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Rodrigo\u00a0Igawa e\u00a0Alex Almeida e Bruno Zarpel\u00e3o\u00a0e Sylvio Barbon\u00a0Jr. 2016. Recognition on Online Social Network by user\u2019s writing style. iSys - Revista Brasileira de Sistemas de Informa\u00e7\u00e3o 8 3(2016) 64\u201385.  Rodrigo\u00a0Igawa e\u00a0Alex Almeida e Bruno Zarpel\u00e3o\u00a0e Sylvio Barbon\u00a0Jr. 2016. Recognition on Online Social Network by user\u2019s writing style. iSys - Revista Brasileira de Sistemas de Informa\u00e7\u00e3o 8 3(2016) 64\u201385.","DOI":"10.5753\/isys.2015.291"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110074"},{"volume-title":"Content-Agnostic Identification of Social Bot Traffic Flows. In 2019 IEEE Conference on Communications and Network Security (CNS). IEEE","year":"2019","author":"Feng Y.","key":"e_1_3_2_1_22_1"},{"volume-title":"Political Bots and the Swedish General Election. In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE","year":"2018","author":"Fernquist J.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3317599"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110091"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2814058.2814061"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093483"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361758.3361784"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380786.3391399"},{"volume-title":"Detecting Fake Accounts on Social Media. In 2018 IEEE International Conference on Big Data (Big Data). IEEE","year":"2018","author":"Khaled S.","key":"e_1_3_2_1_31_1"},{"volume-title":"Procedures for Performing Systematic Reviews","year":"2004","author":"Kitchenham Barbara","key":"e_1_3_2_1_32_1"},{"volume-title":"Deep neural networks for bot detection. Information Sciences 467 (Oct","year":"2018","author":"Kudugunta Sneha","key":"e_1_3_2_1_33_1"},{"volume-title":"Deep Q-Learning and Particle Swarm Optimization for Bot Detection in Online Social Networks. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","year":"2019","author":"Lingam G.","key":"e_1_3_2_1_34_1"},{"volume-title":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS). IEEE","year":"2018","author":"Lingam G.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01488-3"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904220"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098101"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110163"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192525"},{"key":"e_1_3_2_1_41_1","first-page":"4","article-title":"Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social","volume":"58","author":"Natarajan V.","year":"2015","journal-title":"Networks. Comput. J."},{"volume-title":"2018 IEEE 18th International Conference on Communication Technology (ICCT). IEEE","author":"Ping H.","key":"e_1_3_2_1_42_1"},{"volume-title":"Social Bot Detection on 2019 Indonesia President Candidate\u2019s Supporter\u2019s Tweets. Procedia Computer Science 161 (Jan","year":"2019","author":"Pratama Pandu\u00a0Gumelar","key":"e_1_3_2_1_43_1"},{"volume-title":"Machine Learning and Metaheuristics Algorithms, and Applications, Sabu\u00a0M. Thampi, Ljiljana Trajkovic, Kuan-Ching Li","author":"Rajendran Gayathri","key":"e_1_3_2_1_44_1"},{"volume-title":"A one-class classification approach for bot detection on Twitter. Computers & Security 91 (April","year":"2020","author":"Rodr\u00edguez-Ruiz Jorge","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2018.1560920"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2992223"},{"volume-title":"AAFA: Associative Affinity Factor Analysis for Bot Detection and Stance Classification in Twitter. In 2017 IEEE International Conference on Information Reuse and Integration (IRI). IEEE","year":"2017","author":"Sadiq S.","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIS.2018.00016"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901864"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098087"},{"volume-title":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE","year":"2017","author":"Siddiqui H.","key":"e_1_3_2_1_52_1"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017971.3017977"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03146-6_12"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Gabriel Tavares Saulo Mastelini and Sylvio Jr.2017. User Classification on Online Social Networks by Post Frequency. In Anais do XIII Simp\u00f3sio Brasileiro de Sistemas de Informa\u00e7\u00e3o. SBC Porto Alegre Brazil 464\u2013471.  Gabriel Tavares Saulo Mastelini and Sylvio Jr.2017. User Classification on Online Social Networks by Post Frequency. In Anais do XIII Simp\u00f3sio Brasileiro de Sistemas de Informa\u00e7\u00e3o. SBC Porto Alegre Brazil 464\u2013471.","DOI":"10.5753\/sbsi.2017.6076"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2796018"},{"key":"e_1_3_2_1_58_1","unstructured":"Onur Varol Emilio Ferrara Clayton\u00a0A. Davis Filippo Menczer and Alessandro Flammini. 2017. Online Human-Bot Interactions: Detection Estimation and Characterization. arxiv:cs.SI\/1703.03107  Onur Varol Emilio Ferrara Clayton\u00a0A. Davis Filippo Menczer and Alessandro Flammini. 2017. Online Human-Bot Interactions: Detection Estimation and Characterization. arxiv:cs.SI\/1703.03107"},{"volume-title":"Security and Privacy in Communication Networks","author":"Wang Yahan","key":"e_1_3_2_1_59_1"}],"event":{"name":"SBSI 2021: XVII Brazilian Symposium on Information Systems","acronym":"SBSI 2021","location":"Uberl\u00e2ndia Brazil"},"container-title":["XVII Brazilian Symposium on Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466933.3466973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466933.3466973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:10Z","timestamp":1750195690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466933.3466973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,7]]},"references-count":59,"alternative-id":["10.1145\/3466933.3466973","10.1145\/3466933"],"URL":"https:\/\/doi.org\/10.1145\/3466933.3466973","relation":{},"subject":[],"published":{"date-parts":[[2021,6,7]]},"assertion":[{"value":"2021-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}