{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:46:33Z","timestamp":1725795993254},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_51","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"517-526","source":"Crossref","is-referenced-by-count":1,"title":["Anomalous User Comment Detection in Social News Websites"],"prefix":"10.1007","author":[{"given":"Jorge","family":"de-la-Pe\u00f1a-Sordo","sequence":"first","affiliation":[]},{"given":"Iker","family":"Pastor-L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Xabier","family":"Ugarte-Pedrero","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Pablo Garc\u00eda","family":"Bringas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","unstructured":"OReilly, T.: What is web 2.0: Design patterns and business models for the next generation of software. Communications & Strategies\u00a0(1), 17 (2007)"},{"key":"51_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1007\/978-3-642-36973-5_62","volume-title":"Advances in Information Retrieval","author":"M. Dadvar","year":"2013","unstructured":"Dadvar, M., Trieschnigg, D., Ordelman, R., de Jong, F.: Improving cyberbullying detection with user context. In: Serdyukov, P., Braslavski, P., Kuznetsov, S.O., Kamps, J., R\u00fcger, S., Agichtein, E., Segalovich, I., Yilmaz, E. (eds.) ECIR 2013. LNCS, vol.\u00a07814, pp. 693\u2013696. Springer, Heidelberg (2013)"},{"issue":"4","key":"51_CR3","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","volume":"49","author":"P.K. Smith","year":"2008","unstructured":"Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., Tippett, N.: Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry\u00a049(4), 376\u2013385 (2008)","journal-title":"Journal of Child Psychology and Psychiatry"},{"key":"51_CR4","unstructured":"Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: The Social Mobile Web (2011)"},{"issue":"3","key":"51_CR5","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1177\/0165551510365390","volume":"36","author":"P. Shachaf","year":"2010","unstructured":"Shachaf, P., Hara, N.: Beyond vandalism: Wikipedia trolls. Journal of Information Science\u00a036(3), 357\u2013370 (2010)","journal-title":"Journal of Information Science"},{"key":"51_CR6","doi-asserted-by":"crossref","unstructured":"Bergstrom, K.: don\u2019t feed the troll: Shutting down debate about community expectations on reddit. com. First Monday 16(8) (2011)","DOI":"10.5210\/fm.v16i8.3498"},{"key":"51_CR7","doi-asserted-by":"crossref","unstructured":"Fisher, D., Smith, M., Welser, H.T.: You are who you talk to: Detecting roles in usenet newsgroups. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS 2006, vol.\u00a03, p. 59b. IEEE (2006)","DOI":"10.1109\/HICSS.2006.536"},{"key":"51_CR8","unstructured":"Lea, M., O\u2019Shea, T., Fung, P., Spears, R.: \u2019Flaming\u2019in computer-mediated communication: Observations, explanations, implications. Harvester Wheatsheaf (1992)"},{"issue":"6","key":"51_CR9","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1177\/009365098025006006","volume":"25","author":"T. Postmes","year":"1998","unstructured":"Postmes, T., Spears, R., Lea, M.: Breaching or building social boundaries? side-effects of computer-mediated communication. Communication Research\u00a025(6), 689\u2013715 (1998)","journal-title":"Communication Research"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Lerman, K.: User participation in social media: Digg study. In: Proceedings of the 2007 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology-Workshops, pp. 255\u2013258. IEEE Computer Society (2007)","DOI":"10.1109\/WI-IATW.2007.68"},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Review spam detection. In: Proceedings of the 16th International Conference on World Wide Web, pp. 1189\u20131190. ACM (2007)","DOI":"10.1145\/1242572.1242759"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the International Conference on Web Search and Web Data Mining, pp. 219\u2013230. ACM (2008)","DOI":"10.1145\/1341531.1341560"},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Santos, I., de-la Pe\u00f1a-Sordo, J., Pastor-L\u00f3pez, I., Gal\u00e1n-Garc\u00eda, P., Bringas, P.: Automatic categorisation of comments in social news websites. Expert Systems with Applications (2012)","DOI":"10.1016\/j.eswa.2012.05.061"},{"key":"51_CR14","unstructured":"Baeza-Yates, R.A., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc., Boston (1999)"},{"key":"51_CR15","unstructured":"Salton, G., McGill, M.: Introduction to modern information retrieval. McGraw-Hill New York (1983)"},{"issue":"2","key":"51_CR16","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1361348.1361351","volume":"36","author":"S. Tata","year":"2007","unstructured":"Tata, S., Patel, J.M.: Estimating the selectivity of tf-idf based cosine similarity predicates. ACM SIGMOD Record\u00a036(2), 75\u201380 (2007)","journal-title":"ACM SIGMOD Record"},{"key":"51_CR17","unstructured":"Kohavi, R., et al.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, vol.\u00a014, pp. 1137\u20131145 (1995)"},{"key":"51_CR18","doi-asserted-by":"crossref","unstructured":"Cooper, G.F., Herskovits, E.: A bayesian method for constructing bayesian belief networks from databases. In: Proceedings of the 1991 Conference on Uncertainty in Artificial Intelligence (1991)","DOI":"10.1016\/B978-1-55860-203-8.50015-2"},{"key":"51_CR19","unstructured":"Geiger, D., Goldszmidt, M., Provan, G., Langley, P., Smyth, P.: Bayesian network classifiers. In: Machine Learning, pp. 131\u2013163 (1997)"},{"key":"51_CR20","doi-asserted-by":"crossref","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford University Press (1995)","DOI":"10.1201\/9781420050646.ptb6"},{"issue":"6","key":"51_CR21","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1016\/S0893-6080(99)00032-5","volume":"12","author":"S. Amari","year":"1999","unstructured":"Amari, S., Wu, S.: Improving support vector machine classifiers by modifying kernel functions. Neural Networks\u00a012(6), 783\u2013789 (1999)","journal-title":"Neural Networks"},{"key":"51_CR22","doi-asserted-by":"crossref","unstructured":"Maji, S., Berg, A., Malik, J.: Classification using intersection kernel support vector machines is efficient. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1\u20138. IEEE (2008)","DOI":"10.1109\/CVPR.2008.4587630"},{"issue":"1-2","key":"51_CR23","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.aca.2007.03.023","volume":"595","author":"B. \u00dcst\u00fcn","year":"2007","unstructured":"\u00dcst\u00fcn, B., Melssen, W., Buydens, L.: Visualisation and interpretation of support vector regression models. Analytica Chimica Acta\u00a0595(1-2), 299\u2013309 (2007)","journal-title":"Analytica Chimica Acta"},{"issue":"2","key":"51_CR24","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TITB.2007.902300","volume":"12","author":"B. Cho","year":"2008","unstructured":"Cho, B., Yu, H., Lee, J., Chee, Y., Kim, I., Kim, S.: Nonlinear support vector machine visualization for risk factor analysis using nomograms and localized radial basis function kernels. IEEE Transactions on Information Technology in Biomedicine\u00a012(2), 247\u2013256 (2008)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"51_CR25","unstructured":"Garner, S.: Weka: The waikato environment for knowledge analysis. In: Proceedings of the 1995 New Zealand Computer Science Research Students Conference, pp. 57\u201364 (1995)"},{"key":"51_CR26","unstructured":"Quinlan, J.: C4.5 programs for machine learning. Morgan Kaufmann (1993)"},{"issue":"1","key":"51_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Machine Learning\u00a045(1), 5\u201332 (2001)","journal-title":"Machine Learning"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T00:40:30Z","timestamp":1675816830000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_51","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}