{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:00:48Z","timestamp":1742918448109,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_43","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"419-428","source":"Crossref","is-referenced-by-count":36,"title":["Supervised Machine Learning for the Detection of Troll Profiles in Twitter Social Network: Application to a Real Case of Cyberbullying"],"prefix":"10.1007","author":[{"given":"Patxi","family":"Gal\u00e1n-Garc\u00eda","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Gaviria","family":"de la Puerta","sequence":"additional","affiliation":[]},{"given":"Carlos Laorden","family":"G\u00f3mez","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Pablo Garc\u00eda","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"43_CR1","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D. Boyd","year":"2007","unstructured":"Boyd, D., Ellison, N.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication\u00a013(1), 210\u2013230 (2007)","journal-title":"Journal of Computer-Mediated Communication"},{"key":"43_CR2","unstructured":"Sanz, B., Laorden, C., Alvarez, G., Bringas, P.G.: A threat model approach to attacks and countermeasures in on-line social networks. In: Proceedings of the 11th Reunion Espa\u00f1ola de Criptograf\u00eda y Seguridad de la Informaci\u00f3n (RECSI), Tarragona, Spain, September 7-10, pp. 343\u2013348 (2010)"},{"key":"43_CR3","series-title":"AISC","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-16626-6_15","volume-title":"Computational Intelligence in Security for Information Systems 2010","author":"C. Laorden","year":"2010","unstructured":"Laorden, C., Sanz, B., Alvarez, G., Bringas, P.G.: A threat model approach to threats and vulnerabilities in on-line social networks. In: Herrero, \u00c1., Corchado, E., Redondo, C., Alonso, \u00c1. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol.\u00a085, pp. 135\u2013142. Springer, Heidelberg (2010)"},{"issue":"4","key":"43_CR4","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","volume":"49","author":"P.K. Smith","year":"2008","unstructured":"Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., Tippett, N.: Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry\u00a049(4), 376\u2013385 (2008)","journal-title":"Journal of Child Psychology and Psychiatry"},{"issue":"2","key":"43_CR5","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1093\/slr\/hms016","volume":"33","author":"J. Bishop","year":"2012","unstructured":"Bishop, J.: Scope and limitations in the government of wales act 2006 for tackling internet abuses in the form of \u2018flame trolling\u2019. Statute Law Review\u00a033(2), 207\u2013216 (2012)","journal-title":"Statute Law Review"},{"key":"43_CR6","unstructured":"Palfrey, J., Sacco, D., Boyd, D., DeBonis, L., Tatlock, J.: Enhancing child safety & online technologies (2008), \n cyber.law.harvard.edu\/sites\/cyber.law.harvard.edu\/files\/ISTTF_Final_Report.pdf\n (accessed)"},{"issue":"4","key":"43_CR7","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1089\/cpb.2007.0042","volume":"11","author":"H. Vandebosch","year":"2008","unstructured":"Vandebosch, H., Van Cleemput, K.: Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior\u00a011(4), 499\u2013503 (2008)","journal-title":"CyberPsychology & Behavior"},{"key":"43_CR8","series-title":"AISC","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-33018-6_27","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions","author":"C. Laorden","year":"2013","unstructured":"Laorden, C., Gal\u00e1n-Garc\u00eda, P., Santos, I., Sanz, B., Hidalgo, J.M.G., Bringas, P.G.: Negobot: A conversational agent based on game theory for the detection of paedophile behaviour. In: Herrero, \u00c1., Sn\u00e1\u0161el, V., Abraham, A., Zelinka, I., Baruque, B., Quinti\u00e1n, H., Calvo, J.L., Sedano, J., Corchado, E. (eds.) Int. Joint Conf. CISIS\u201912-ICEUTE\u201912-SOCO\u201912. AISC, vol.\u00a0189, pp. 261\u2013270. Springer, Heidelberg (2013)"},{"key":"43_CR9","unstructured":"Kontostathis, A.: Chatcoder: Toward the tracking and categorization of internet predators. In: Text Mining Workshop 2009 Held in Conjunction with the 9th Siam International Conference on Data Mining (SDM 2009), Sparks, NV (May 2009)"},{"key":"43_CR10","unstructured":"Smets, K., Goethals, B., Verdonk, B.: Automatic vandalism detection in wikipedia: Towards a machine learning approach. In: AAAI Workshop on Wikipedia and Artificial Intelligence: An Evolving Synergy, pp. 43\u201348 (2008)"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Tan, P.N., Chen, F., Jain, A.: Information assurance: Detection of web spam attacks in social media. In: Proceedings of Army Science Conference, Orland, Florida (2010)","DOI":"10.21236\/ADA535002"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Simanjuntak, D.A., Ipung, H.P., Lim, C., Nugroho, A.S.: Text classification techniques used to faciliate cyber terrorism investigation. In: 2010 Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), pp. 198\u2013200. IEEE (2010)","DOI":"10.1109\/ACT.2010.40"},{"key":"43_CR13","unstructured":"Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: International Conference on Weblog and Social Media-Social Mobile Web Workshop (2011)"},{"issue":"4","key":"43_CR14","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O. De Vel","year":"2001","unstructured":"De Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining e-mail content for author identification forensics. ACM Sigmod Record\u00a030(4), 55\u201364 (2001)","journal-title":"ACM Sigmod Record"},{"key":"43_CR15","unstructured":"Holmes, G., Donkin, A., Witten, I.H.: Weka: A machine learning workbench. In: Proceedings of the 1994 Second Australian and New Zealand Conference on Intelligent Information Systems, pp. 357\u2013361. IEEE (1994)"},{"key":"43_CR16","unstructured":"Garner, S.R., et al.: Weka: The waikato environment for knowledge analysis. In: Proceedings of the New Zealand Computer Science Research Students Conference, pp. 57\u201364. Citeseer (1995)"},{"issue":"1","key":"43_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1177\/016555159201800106","volume":"18","author":"W.J. Wilbur","year":"1992","unstructured":"Wilbur, W.J., Sirotkin, K.: The automatic identification of stop words. Journal of Information Science\u00a018(1), 45\u201355 (1992)","journal-title":"Journal of Information Science"},{"key":"43_CR18","unstructured":"Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: International Joint Conference on Artificial Intelligence, vol.\u00a014, pp. 1137\u20131145. Lawrence Erlbaum Associates Ltd. (1995)"},{"key":"43_CR19","volume-title":"Introduction to modern information retrieval","author":"G. Salton","year":"1983","unstructured":"Salton, G., McGill, M.: Introduction to modern information retrieval. McGraw-Hill, New York (1983)"},{"key":"43_CR20","volume-title":"Modern Information Retrieval","author":"R.A. Baeza-Yates","year":"1999","unstructured":"Baeza-Yates, R.A., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc., Boston (1999)"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T15:57:54Z","timestamp":1681487874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}