{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T07:43:08Z","timestamp":1733816588089,"version":"3.30.1"},"reference-count":31,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AIC"],"published-print":{"date-parts":[[2020,8,5]]},"DOI":"10.3233\/aic-200647","type":"journal-article","created":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T16:13:28Z","timestamp":1593188008000},"page":"13-25","source":"Crossref","is-referenced-by-count":0,"title":["The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet"],"prefix":"10.1177","volume":"33","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[{"name":"SPIIRAS, 39, 14 Liniya, St. Petersburg, 199178, Russia. E-mails:\u00a0ivkote@comsec.spb.ru,\u00a0vitkova@comsec.spb.ru,\u00a0ibsaen@comsec.spb.ru,\u00a0tushkanova@comsec.spb.ru,\u00a0branitskiy@comsec.spb.ru"}]},{"given":"Lidiya","family":"Vitkova","sequence":"additional","affiliation":[{"name":"SPIIRAS, 39, 14 Liniya, St. Petersburg, 199178, Russia. E-mails:\u00a0ivkote@comsec.spb.ru,\u00a0vitkova@comsec.spb.ru,\u00a0ibsaen@comsec.spb.ru,\u00a0tushkanova@comsec.spb.ru,\u00a0branitskiy@comsec.spb.ru"}]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[{"name":"SPIIRAS, 39, 14 Liniya, St. Petersburg, 199178, Russia. E-mails:\u00a0ivkote@comsec.spb.ru,\u00a0vitkova@comsec.spb.ru,\u00a0ibsaen@comsec.spb.ru,\u00a0tushkanova@comsec.spb.ru,\u00a0branitskiy@comsec.spb.ru"}]},{"given":"Olga","family":"Tushkanova","sequence":"additional","affiliation":[{"name":"SPIIRAS, 39, 14 Liniya, St. Petersburg, 199178, Russia. E-mails:\u00a0ivkote@comsec.spb.ru,\u00a0vitkova@comsec.spb.ru,\u00a0ibsaen@comsec.spb.ru,\u00a0tushkanova@comsec.spb.ru,\u00a0branitskiy@comsec.spb.ru"}]},{"given":"Alexander","family":"Branitskiy","sequence":"additional","affiliation":[{"name":"SPIIRAS, 39, 14 Liniya, St. Petersburg, 199178, Russia. E-mails:\u00a0ivkote@comsec.spb.ru,\u00a0vitkova@comsec.spb.ru,\u00a0ibsaen@comsec.spb.ru,\u00a0tushkanova@comsec.spb.ru,\u00a0branitskiy@comsec.spb.ru"}]}],"member":"179","reference":[{"key":"10.3233\/AIC-200647_ref1","unstructured":"C.C.\u00a0Aggarwal, Data Classification: Algorithms and Applications, CRC Press, 2014."},{"key":"10.3233\/AIC-200647_ref2","doi-asserted-by":"crossref","unstructured":"C.C.\u00a0Aggarwal, Machine Learning for Text, Springer, 2018.","DOI":"10.1007\/978-3-319-73531-3"},{"key":"10.3233\/AIC-200647_ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78256-0_2"},{"key":"10.3233\/AIC-200647_ref4","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1016\/j.procs.2018.07.279","article-title":"Identifying fake news and fake users on Twitter","volume":"126","author":"Atodiresei","year":"2018","journal-title":"Procedia Computer Science"},{"key":"10.3233\/AIC-200647_ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983695"},{"key":"10.3233\/AIC-200647_ref6","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Benkler, R.\u00a0Faris and H.\u00a0Roberts, Network Propaganda: Manipulation, Disinformation, and Radicalization in American Politics, Oxford University Press, 2018.","DOI":"10.1093\/oso\/9780190923624.001.0001"},{"key":"10.3233\/AIC-200647_ref7","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","article-title":"Enriching word vectors with subword information","volume":"5","author":"Bojanowski","year":"2017","journal-title":"Transactions of the Association for Computational Linguistics"},{"key":"10.3233\/AIC-200647_ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924380"},{"issue":"1","key":"10.3233\/AIC-200647_ref9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/pra2.2015.145052010082","article-title":"Automatic deception detection: Methods for finding fake news","volume":"52","author":"Conroy","year":"2015","journal-title":"Proceedings of the Association for Information Science and Technology"},{"key":"10.3233\/AIC-200647_ref11","doi-asserted-by":"crossref","unstructured":"Z.\u00a0Durumeric, D.\u00a0Adrian, A.\u00a0Mirian, M.\u00a0Bailey and J.A.\u00a0Halderman, A\u00a0search engine backed by Internet-wide scanning, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, 2015, pp.\u00a0542\u2013553.","DOI":"10.1145\/2810103.2813703"},{"key":"10.3233\/AIC-200647_ref12","doi-asserted-by":"crossref","unstructured":"R.\u00a0Feldman and J.\u00a0Sanger, The Text Mining Handbook: Advanced Approaches in Analyzing Unstructured Data, Cambridge University Press, 2007.","DOI":"10.1017\/CBO9780511546914"},{"issue":"1","key":"10.3233\/AIC-200647_ref15","doi-asserted-by":"publisher","first-page":"236","DOI":"10.20533\/ijisr.2042.4639.2013.0029","article-title":"Enhancing phishing e-mail classifiers: A\u00a0lexical url analysis approach","volume":"3","author":"Khonji","year":"2013","journal-title":"International Journal for Information Security Research"},{"key":"10.3233\/AIC-200647_ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7340769"},{"issue":"1","key":"10.3233\/AIC-200647_ref17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1504\/IJIPT.2017.083038","article-title":"Categorisation of web pages for protection against inappropriate content in the Internet","volume":"10","author":"Kotenko","year":"2017","journal-title":"International Journal of Internet Protocol Technology"},{"issue":"4","key":"10.3233\/AIC-200647_ref18","doi-asserted-by":"publisher","first-page":"60","DOI":"10.22667\/JOWUA.2017.12.31.060","article-title":"Parallel big data processing system for security monitoring in Internet of things networks","volume":"8","author":"Kotenko","year":"2017","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"10.3233\/AIC-200647_ref19","doi-asserted-by":"crossref","unstructured":"S.\u00a0Lai, L.\u00a0Xu, K.\u00a0Liu and J.\u00a0Zhao, Recurrent convolutional neural networks for text classification, in: Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015, pp.\u00a02267\u20132273.","DOI":"10.1609\/aaai.v29i1.9513"},{"key":"10.3233\/AIC-200647_ref20","doi-asserted-by":"publisher","DOI":"10.3390\/info8040118"},{"key":"10.3233\/AIC-200647_ref21","unstructured":"Y.\u00a0Liu, Y.\u00a0Liu, M.\u00a0Zhang and S.\u00a0Ma, Pay me and I\u2019ll follow you: Detection of crowdturfing following activities in microblog environment, in: IJCAI\u201916: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, AAAI Press, 2016, pp.\u00a03789\u20133796."},{"key":"10.3233\/AIC-200647_ref22","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1162\/153244302760200687","article-title":"Text classification using string kernels","volume":"2","author":"Lodhi","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"10.3233\/AIC-200647_ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"10.3233\/AIC-200647_ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091523"},{"key":"10.3233\/AIC-200647_ref27","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1007692713085","article-title":"Text classification from labeled and unlabeled documents using EM","volume":"39","author":"Nigam","year":"2000","journal-title":"Machine Learning"},{"key":"10.3233\/AIC-200647_ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25017-5_24"},{"key":"10.3233\/AIC-200647_ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1459352.1459357"},{"issue":"1","key":"10.3233\/AIC-200647_ref31","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","article-title":"Fake news detection on social media: A\u00a0data mining perspective","volume":"19","author":"Shu","year":"2017","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"10.3233\/AIC-200647_ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188722"},{"key":"10.3233\/AIC-200647_ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23766-4_45"},{"key":"10.3233\/AIC-200647_ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32258-8_29"},{"key":"10.3233\/AIC-200647_ref36","doi-asserted-by":"crossref","unstructured":"L.R.\u00a0Waugh, The poetic function in the theory of Roman Jakobson, in: Poetics Today, Vol.\u00a02, Duke University Press, 1980, pp.\u00a057\u201382.","DOI":"10.2307\/1772352"},{"key":"10.3233\/AIC-200647_ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313462"},{"key":"10.3233\/AIC-200647_ref38","unstructured":"X.\u00a0Zhang, J.\u00a0Zhao and Y.\u00a0LeCun, Character-level convolutional networks for text classification, in: NIPS\u201915: Proceedings of the 28th International Conference on Neural Information Processing Systems, Vol.\u00a01, 2015, pp.\u00a0649\u2013657."}],"container-title":["AI Communications"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/AIC-200647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T10:07:45Z","timestamp":1733738865000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/AIC-200647"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,5]]},"references-count":31,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/aic-200647","relation":{},"ISSN":["1875-8452","0921-7126"],"issn-type":[{"type":"electronic","value":"1875-8452"},{"type":"print","value":"0921-7126"}],"subject":[],"published":{"date-parts":[[2020,8,5]]}}}