{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T16:27:36Z","timestamp":1720801656541},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Online Social Networks and Media"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1016\/j.osnem.2018.10.005","type":"journal-article","created":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T10:11:54Z","timestamp":1543054314000},"page":"1-16","source":"Crossref","is-referenced-by-count":38,"special_numbering":"C","title":["On the capability of evolved spambots to evade detection via genetic engineering"],"prefix":"10.1016","volume":"9","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0170-2445","authenticated-orcid":false,"given":"Stefano","family":"Cresci","sequence":"first","affiliation":[]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[]},{"given":"Angelo","family":"Spognardi","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tognazzi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.osnem.2018.10.005_bib0001","series-title":"Proceedings of the 10th International Conference on Web and Social Media (ICWSM\u201916)","first-page":"563","article-title":"Detection of promoted social media campaigns","author":"Ferrara","year":"2016"},{"key":"10.1016\/j.osnem.2018.10.005_bib0002","series-title":"Harnessing the Social Sensing revolution: Challenges and Opportunities","author":"Cresci","year":"2018"},{"key":"10.1016\/j.osnem.2018.10.005_bib0003","series-title":"Proceedings of the 5th International Conference on Web and Social Media (ICWSM\u201911)","first-page":"297","article-title":"Detecting and tracking political abuse in social media","author":"Ratkiewicz","year":"2011"},{"key":"10.1016\/j.osnem.2018.10.005_bib0004","series-title":"Proceedings of the 12th International Conference on Web and Social Media (ICWSM\u201918)","first-page":"580","article-title":"$FAKE: Evidence of spam and bot activity in stock microblogs on Twitter","author":"Cresci","year":"2018"},{"key":"10.1016\/j.osnem.2018.10.005_bib0005","series-title":"Proceedings of the WWW\u201917 Companion","first-page":"963","article-title":"The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race","author":"Cresci","year":"2017"},{"issue":"8","key":"10.1016\/j.osnem.2018.10.005_bib0006","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","article-title":"Empirical evaluation and new design for fighting evolving Twitter spammers","volume":"8","author":"Yang","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"10.1016\/j.osnem.2018.10.005_bib0007","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/2818717","article-title":"The rise of social bots","volume":"59","author":"Ferrara","year":"2016","journal-title":"Commun. ACM"},{"key":"10.1016\/j.osnem.2018.10.005_bib0008","series-title":"Proceedings of the 27th Web Conference Companion (WWW\u201918 Companion)","first-page":"1469","article-title":"From reaction to proaction: unexplored ways to the detection of evolving spambots","author":"Tognazzi","year":"2018"},{"issue":"31","key":"10.1016\/j.osnem.2018.10.005_bib0009","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MIS.2016.29","article-title":"DNA-inspired online behavioral modeling and its application to spambot detection","volume":"5","author":"Cresci","year":"2016","journal-title":"IEEE Intell. Syst."},{"issue":"15","key":"10.1016\/j.osnem.2018.10.005_bib0010","first-page":"561","article-title":"Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling","volume":"4","author":"Cresci","year":"2018","journal-title":"IEEE Trans. Dep. Secur. Comput."},{"key":"10.1016\/j.osnem.2018.10.005_bib0011","series-title":"An Introduction to Genetic Algorithms","author":"Mitchell","year":"1998"},{"key":"10.1016\/j.osnem.2018.10.005_bib0012","series-title":"Proceedings of the 28th International Conference on Artificial Intelligence (AAAI\u201914)","first-page":"59","article-title":"Online social spammer detection","author":"Hu","year":"2014"},{"key":"10.1016\/j.osnem.2018.10.005_bib0013","series-title":"Proceedings of the 4th International Conference on Data Science and Advanced Analytics (DSAA\u201917)","first-page":"686","article-title":"Exploiting digital DNA for the analysis of similarities in Twitter behaviours","author":"Cresci","year":"2017"},{"key":"10.1016\/j.osnem.2018.10.005_bib0014","series-title":"Algorithms on Strings, Trees and Sequences: Computer Science and Computational Biology","author":"Gusfield","year":"1997"},{"issue":"4","key":"10.1016\/j.osnem.2018.10.005_bib0015","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1007\/s00453-009-9369-1","article-title":"Linear time algorithms for generalizations of the longest common substring problem","volume":"60","author":"Arnold","year":"2011","journal-title":"Algorithmica"},{"key":"10.1016\/j.osnem.2018.10.005_bib0016","series-title":"Combinatorial Pattern Matching","first-page":"230","article-title":"Color set size problem with applications to string matching","author":"Chi","year":"1992"},{"key":"10.1016\/j.osnem.2018.10.005_bib0017","series-title":"Proceedings of the 26th International Conference on World Wide Web Companion","first-page":"1413","article-title":"Hybrid crowdsensing: a novel paradigm to combine the strengths of opportunistic and participatory crowdsensing","author":"Avvenuti","year":"2017"},{"key":"10.1016\/j.osnem.2018.10.005_bib0018","series-title":"Proceedings of the 26th International Conference on World Wide Web (WWW\u201917 Companion)","first-page":"963","article-title":"The paradigm-shift of social spambots: evidence, theories, and tools for the arms race","author":"Cresci","year":"2017"},{"key":"10.1016\/j.osnem.2018.10.005_bib0019","series-title":"Proceedings of the 1st International Conference on Advanced Data Analysis, Business Analytics and Intelligence","article-title":"Simple algorithms for peak detection in time-series","author":"Palshikar","year":"2009"},{"issue":"4","key":"10.1016\/j.osnem.2018.10.005_bib0020","first-page":"72","article-title":"Nowcasting events from the social web with statistical learning","volume":"3","author":"Lampos","year":"2012","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"issue":"17","key":"10.1016\/j.osnem.2018.10.005_bib0021","doi-asserted-by":"crossref","first-page":"3067","DOI":"10.1016\/j.ins.2010.03.025","article-title":"In-depth behavior understanding and use: the behavior informatics approach","volume":"180","author":"Cao","year":"2010","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.osnem.2018.10.005_bib0022","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MIS.2015.17","article-title":"Predicting elections for multiple countries using twitter and polls","volume":"30","author":"Tsakalidis","year":"2015","journal-title":"IEEE Intell. Syst."},{"issue":"8","key":"10.1016\/j.osnem.2018.10.005_bib0023","doi-asserted-by":"crossref","first-page":"1644","DOI":"10.1109\/TPAMI.2013.2297321","article-title":"Prediction of human activity by discovering temporal sequence patterns","volume":"36","author":"Li","year":"2014","journal-title":"Pattern Anal. Mach. Intell. IEEE Trans."},{"issue":"1","key":"10.1016\/j.osnem.2018.10.005_bib0024","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/s13278-014-0162-z","article-title":"Uncovering deception in social media","volume":"4","author":"Liu","year":"2014","journal-title":"Social Netw. Anal. Min."},{"key":"10.1016\/j.osnem.2018.10.005_bib0025","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","article-title":"Fame for sale: efficient detection of fake Twitter followers","volume":"80","author":"Cresci","year":"2015","journal-title":"Decis. Support Syst."},{"issue":"8","key":"10.1016\/j.osnem.2018.10.005_bib0026","doi-asserted-by":"crossref","first-page":"1280","DOI":"10.1109\/TIFS.2013.2267732","article-title":"Empirical evaluation and new design for fighting evolving twitter spammers","volume":"8","author":"Yang","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.osnem.2018.10.005_bib0027","first-page":"35","article-title":"Catching synchronized behaviors in large networks: a graph mining approach","volume":"10","author":"Jiang","year":"2016","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"10.1016\/j.osnem.2018.10.005_bib0028","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"59","article-title":"Online social spammer detection","author":"Hu","year":"2014"},{"issue":"2","key":"10.1016\/j.osnem.2018.10.005_bib0029","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1140\/epjb\/e2011-20124-0","article-title":"Lognormal distribution in the digg online social network","volume":"83","author":"Van Mieghem","year":"2011","journal-title":"Eur. Phys. J. B"},{"issue":"1","key":"10.1016\/j.osnem.2018.10.005_bib0030","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjds2","article-title":"Long trend dynamics in social media","volume":"1","author":"Wang","year":"2012","journal-title":"EPJ Data Sci."},{"issue":"5","key":"10.1016\/j.osnem.2018.10.005_bib0031","doi-asserted-by":"crossref","first-page":"e64349","DOI":"10.1371\/journal.pone.0064349","article-title":"Lognormal infection times of online information spread","volume":"8","author":"Doerr","year":"2013","journal-title":"PLoS One"}],"container-title":["Online Social Networks and Media"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S246869641830065X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S246869641830065X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T11:05:04Z","timestamp":1564139104000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S246869641830065X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":31,"alternative-id":["S246869641830065X"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.osnem.2018.10.005","relation":{},"ISSN":["2468-6964"],"issn-type":[{"value":"2468-6964","type":"print"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}