{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:11:50Z","timestamp":1726053110756},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322571"},{"type":"electronic","value":"9783030322588"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_29","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:31:35Z","timestamp":1569922295000},"page":"244-254","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Approach to Creating an Intelligent System for Detecting and Countering Inappropriate Information on the Internet"],"prefix":"10.1007","author":[{"given":"Lidiya","family":"Vitkova","sequence":"first","affiliation":[]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[]},{"given":"Olga","family":"Tushkanova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b17320","volume-title":"Data Classification: Algorithms and Applications","author":"CC Aggarwal","year":"2014","unstructured":"Aggarwal, C.C.: Data Classification: Algorithms and Applications. CRC Press, Boca Raton (2014)"},{"key":"29_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73531-3","volume-title":"Machine Learning for Text","author":"CC Aggarwal","year":"2018","unstructured":"Aggarwal, C.C.: Machine Learning for Text. Springer, Cham (2018)"},{"key":"29_CR3","first-page":"19","volume-title":"Lecture Notes in Social Networks","author":"Samer Al-Khateeb","year":"2018","unstructured":"Al-Khateeb, S., Hussain, M.N., Agarwal, M.N.: Leveraging social network analysis and cyber forensics approaches to study cyber propaganda campaigns. In: Social Networks and Surveillance for Society, pp. 19\u201342. Springer, Cham (2019)"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.procs.2018.07.279","volume":"126","author":"C-S Atodiresei","year":"2018","unstructured":"Atodiresei, C.-S., T\u0103n\u0103selea, A., Iftene, A.: Identifying fake news and fake users on twitter. Procedia Comput. Sci. 126, 451\u2013461 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Badri\u00a0Satya, P.R., Lee, K., Lee, D., Tran, T., Zhang, J.J.: Uncovering fake likers in online social networks. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 2365\u20132370. ACM (2016)","DOI":"10.1145\/2983323.2983695"},{"key":"29_CR6","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190923624.001.0001","volume-title":"Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics","author":"Y Benkler","year":"2018","unstructured":"Benkler, Y., Faris, R., Roberts, H.: Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics. Oxford University Press, Oxford (2018)"},{"issue":"1","key":"29_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/pra2.2015.145052010082","volume":"52","author":"NJ Conroy","year":"2015","unstructured":"Conroy, N.J., Rubin, V.L., Chen, Y.: Automatic deception detection: methods for finding fake news. Proc. Assoc. Inf. Sci. Technol. 52(1), 1\u20134 (2015)","journal-title":"Proc. Assoc. Inf. Sci. Technol."},{"key":"29_CR8","volume-title":"The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data","author":"R Feldman","year":"2007","unstructured":"Feldman, R., Sanger, J.: The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data. Cambridge University Press, Cambridge (2007)"},{"issue":"1\/2","key":"29_CR9","first-page":"40","volume":"2","author":"M Khonji","year":"2012","unstructured":"Khonji, M., Iraqi, Y., Jones, A.: Enhancing phishing e-mail classifiers: a lexical url analysis approach. Int. J. Inf. Secur. Res. (IJISR) 2(1\/2), 40 (2012)","journal-title":"Int. J. Inf. Secur. Res. (IJISR)"},{"issue":"1","key":"29_CR10","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1504\/IJIPT.2017.083038","volume":"10","author":"I Kotenko","year":"2017","unstructured":"Kotenko, I., Chechulin, A., Komashinsky, D.: Categorisation of web pages for protection against inappropriate content in the internet. Int. J. Internet Protoc. Technol. 10(1), 61\u201371 (2017)","journal-title":"Int. J. Internet Protoc. Technol."},{"issue":"4","key":"29_CR11","first-page":"60","volume":"8","author":"IV Kotenko","year":"2017","unstructured":"Kotenko, I.V., Saenko, I., Kushnerevich, A.: Parallel big data processing system for security monitoring in internet of things networks. JoWUA 8(4), 60\u201374 (2017)","journal-title":"JoWUA"},{"issue":"4","key":"29_CR12","doi-asserted-by":"publisher","first-page":"118","DOI":"10.3390\/info8040118","volume":"8","author":"M Li","year":"2017","unstructured":"Li, M., Wang, X., Gao, K., Zhang, S.: A survey on information diffusion in online social networks: models and methods. Information 8(4), 118 (2017)","journal-title":"Information"},{"key":"29_CR13","unstructured":"Liu, Y., Liu, Y., Zhang, M., Ma, S.: Pay me and i\u2019ll follow you: detection of crowdturfing following activities in microblog environment. In: IJCAI, pp. 3789\u20133796 (2016)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious urls. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245\u20131254. ACM (2009)","DOI":"10.1145\/1557019.1557153"},{"key":"29_CR15","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint \n arXiv:1301.3781\n \n (2013)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Mustafaraj, E., Metaxas, P.T.: The fake news spreading plague: was it preventable? In: Proceedings of the 2017 ACM on Web Science Conference, pp. 235\u2013239. ACM (2017)","DOI":"10.1145\/3091478.3091523"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Novozhilov, D., Kotenko, I., Chechulin, A.: Improving the categorization of web sites by analysis of html-tags statistics to block inappropriate content. In: Intelligent Distributed Computing IX, pp. 257\u2013263. Springer (2016)","DOI":"10.1007\/978-3-319-25017-5_24"},{"issue":"2","key":"29_CR18","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1459352.1459357","volume":"41","author":"X Qi","year":"2009","unstructured":"Qi, X., Davison, B.D.: Web page classification: features and algorithms. ACM Comput. Surv. (CSUR) 41(2), 12 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"29_CR19","unstructured":"Raniere, K.A.: Data stream division to increase data transmission rates, 5 December 2017. US Patent 9,838,166 (2017)"},{"issue":"1","key":"29_CR20","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22\u201336 (2017)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Tschiatschek, S., Singla, A., Gomez\u00a0Rodriguez, M., Merchant, M., Krause, A.: Fake news detection in social networks via crowd signals. In: Companion of the The Web Conference 2018 on The Web Conference 2018, pp. 517\u2013524. International World Wide Web Conferences Steering Committee (2018)","DOI":"10.1145\/3184558.3188722"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Tushkanova, O.: Comparative analysis of the numerical measures for mining associative and causal relationships in big data. In: Creativity in Intelligent Technologies and Data Science, First conference Proceedings, CIT&DS, pp. 571\u2013582. Springer (2015)","DOI":"10.1007\/978-3-319-23766-4_45"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T09:35:03Z","timestamp":1569922503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_29","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}