{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T05:07:56Z","timestamp":1711688876534},"reference-count":37,"publisher":"Informa UK Limited","issue":"7","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Communications in Statistics - Simulation and Computation"],"published-print":{"date-parts":[[2023,7,3]]},"DOI":"10.1080\/03610918.2021.1928192","type":"journal-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T19:25:26Z","timestamp":1621279526000},"page":"3122-3136","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Performance comparison of some centrality measures used in detecting anomalies in directed social networks"],"prefix":"10.1080","volume":"52","author":[{"given":"Abeer A.","family":"Zaki","sequence":"first","affiliation":[{"name":"Department of Statistics, Faculty of Economics and Political Science, Cairo University, Cairo, Egypt"}]},{"given":"Nesma A.","family":"Saleh","sequence":"additional","affiliation":[{"name":"Department of Statistics, Faculty of Economics and Political Science, Cairo University, Cairo, Egypt"}]},{"given":"Mahmoud A.","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"Department of Statistics, Faculty of Economics and Political Science, Cairo University, Cairo, Egypt"}]}],"member":"301","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30287-9_1"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0400087101"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353424"},{"key":"CIT0005","volume-title":"Exploratory social network analysis with Pajek: Revised and expanded edition for updated software (Structural analysis in the social sciences)","author":"De Nooy W.","year":"2018","edition":"3"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"CIT0007","unstructured":"Egele, M., G. Stringhini, C. Kruegel, and G. Vigna. 2013. COMPA: Detecting compromised accounts on social networks. In Symposium on Network and Distributed System Security (NDSS), San Diego, CA, USA."},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/19434472.2012.725225"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1080\/03610926.2016.1263741"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2010.06.004"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2267"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1002\/asmb.2326"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1002\/sim.3081"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-010-0127-3"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.21307\/joss-2019-031"},{"key":"CIT0018","volume-title":"Introduction to statistical quality control","author":"Montgomery D. C.","year":"2009","edition":"6"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.016132"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.03.006"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1959.10489860"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-012-0063-y"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.05.002"},{"issue":"1","key":"CIT0024","first-page":"120","volume":"4","author":"Shetty J.","year":"2004","journal-title":"Information Sciences Institute Technical Report, University of Southern California"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1924.tb01347.x"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1919"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1080\/00224065.2018.1507557"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1256"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1256"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39149-1_5"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(02)00030-1"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(94)90015-9"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2520"},{"key":"CIT0034","first-page":"15","volume-title":"Frontiers in statistical quality control","volume":"11","author":"Woodall W. H.","year":"2015"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1080\/0740817X.2016.1213468"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1145\/1064830.1064834"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2364"}],"container-title":["Communications in Statistics - Simulation and Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/03610918.2021.1928192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T22:26:13Z","timestamp":1689805573000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/03610918.2021.1928192"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,17]]},"references-count":37,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7,3]]}},"alternative-id":["10.1080\/03610918.2021.1928192"],"URL":"https:\/\/doi.org\/10.1080\/03610918.2021.1928192","relation":{},"ISSN":["0361-0918","1532-4141"],"issn-type":[{"value":"0361-0918","type":"print"},{"value":"1532-4141","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=lssp20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=lssp20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-08-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-03","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}