Activity profiles in online social media
暂无分享,去创建一个
Mohamed Faouzi Atig | Sofia Cassel | Lisa Kaati | Amendra Shrestha | Sofia Cassel | M. Atig | Lisa Kaati | A. Shrestha
[1] Rong Zheng,et al. A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006, J. Assoc. Inf. Sci. Technol..
[2] Ahmed Abbasi,et al. Affect Intensity Analysis of Dark Web Forums , 2007, 2007 IEEE Intelligence and Security Informatics.
[3] Fredrik Johansson,et al. Detecting multiple aliases in social media , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[4] Duncan J. Watts,et al. Characterizing individual communication patterns , 2009, KDD.
[5] R. Larsen,et al. Individual differences in circadian activity rhythm and personality. , 1985 .
[6] Dawn Xiaodong Song,et al. On the Feasibility of Internet-Scale Author Identification , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] J. Horne,et al. A self-assessment questionnaire to determine morningness-eveningness in human circadian rhythms. , 1976, International journal of chronobiology.
[8] Conor Hayes,et al. Evolutionary Clustering and Analysis of User Behaviour in Online Forums , 2012, ICWSM.
[9] Yanlei Wu,et al. 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2014, Beijing, China, August 17-20, 2014 , 2014, ASONAM.
[10] C. Randler,et al. Circadian Typology: A Comprehensive Review , 2012, Chronobiology international.
[11] Bernardo A. Huberman,et al. Predicting the Future with Social Media , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[12] Claude Castelluccia,et al. How Unique and Traceable Are Usernames? , 2011, PETS.
[13] Pankaj Rohatgi,et al. Can Pseudonymity Really Guarantee Privacy? , 2000, USENIX Security Symposium.
[14] Elizabeth M. Daly,et al. Decomposing Discussion Forums and Boards Using User Roles , 2010, ICWSM.
[15] Johan Dahlin,et al. Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[16] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[17] Nayer M. Wanas,et al. CLUSTERING POSTS IN ONLINE DISCUSSION FORUM THREADS , 2011 .
[18] Ramakrishnan Srikant,et al. Mining newsgroups using networks arising from social behavior , 2003, WWW '03.
[19] Johan Bollen,et al. Twitter mood predicts the stock market , 2010, J. Comput. Sci..
[20] Lisa Kaati,et al. Social positions and simulation relations , 2011, Social Network Analysis and Mining.
[21] Jasmine Novak,et al. Anti-aliasing on the web , 2004, WWW '04.