Similarity Analysis of Criminals on Social Networks: An Example on Twitter
暂无分享,去创建一个
[1] Dong Wang,et al. Discovering Similar Users on Twitter , 2013 .
[2] Enghin Omer,et al. Using machine learning to identify jihadist messages on Twitter , 2015 .
[3] Online Sex Slaves: The Internet's Powerful Role in Sex Trafficking , 2016 .
[4] Philip S. Yu,et al. Scalable Link-Based Similarity Computation and Clustering , 2010, Link Mining.
[5] Qi He,et al. TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.
[6] Mina Razghandi,et al. A Context-Aware and User Behavior-Based Recommender System with Regarding Social Network Analysis , 2017, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE).
[7] Mohammad T. Khasawneh,et al. New framework that uses patterns and relations to understand terrorist behaviors , 2017, Expert Syst. Appl..
[8] Christopher M. Gifford,et al. Fuzzy association rule mining for community crime pattern discovery , 2010, ISI-KDD '10.
[9] J. Klausen. Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq , 2015 .
[10] Uuf Brajawidagda,et al. Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks , 2015, DG.O.
[11] Pankaj Choudhary,et al. A Survey on Social Network Analysis for Counter- Terrorism , 2015 .
[12] Max Mühlhäuser,et al. A multi-language approach towards the identification of suspicious users on social networks , 2017, 2017 International Carnahan Conference on Security Technology (ICCST).
[13] Nasrullah Memon,et al. Practical Algorithms for Destabilizing Terrorist Networks , 2006, ISI.
[14] Iwao Fujino,et al. Finding Similar Tweets and Similar Users by Applying Document Similarity to Twitter Streaming Data , 2013 .
[15] Divya Bansal,et al. Execution of APRIORI Algorithm of Data Mining Directed Towards Tumultuous Crimes Concerning Women , 2013 .
[16] R. Rajasree,et al. Sentiment analysis in twitter using machine learning techniques , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[17] Lay-Ki Soon,et al. Natural Language Processing for Sentiment Analysis: An Exploratory Analysis on Tweets , 2014, 2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology.
[18] Virender Ranga,et al. Sentiment analysis of the Uri terror attack using Twitter , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[19] Eliane Tschaen Barbieri,et al. The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign , 2012 .
[20] D. Masciandaro. Global Financial Crime : Terrorism, Money Laundering and Offshore Centres , 2017 .
[21] George Karypis,et al. Item-based top-N recommendation algorithms , 2004, TOIS.
[22] Shyam Varan Nath,et al. Crime Pattern Detection Using Data Mining , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[23] Junghoo Cho,et al. Topical semantics of twitter links , 2011, WSDM '11.
[24] Divya Bansal,et al. Usage of Apriori Algorithm of Data Mining as an Application to Grievous Crimes against Women , 2013 .
[25] R. Bates. Dancing With Wolves: Today's Lone Wolf Terrorists , 2012 .
[26] Damon McCoy,et al. Constructing and Analyzing Criminal Networks , 2014, 2014 IEEE Security and Privacy Workshops.
[27] Neha Mahyavanshi,et al. A Novel Idea for Credit Card Fraud Detection using Decision Tree , 2017 .
[28] Matthew S. Gerber,et al. Predicting crime using Twitter and kernel density estimation , 2014, Decis. Support Syst..
[29] Boleslaw K. Szymanski,et al. Overlapping community detection in networks: The state-of-the-art and comparative study , 2011, CSUR.
[30] Kristin M. Finklea,et al. Organized Crime: An Evolving Challenge for U.S. Law Enforcement , 2010 .
[31] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[32] P. Bonacich. Factoring and weighting approaches to status scores and clique identification , 1972 .
[33] Sreela Sasi,et al. Sentiment Analysis of ISIS Related Tweets Using Absolute Location , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[34] A. Malathi,et al. Algorithmic Crime Prediction Model Based on the Analysis of Crime Clusters , 2011 .
[35] Yiannis Kompatsiaris,et al. Detection of Terrorism-related Twitter Communities using Centrality Scores , 2017, MFSec@ICMR.
[36] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[37] Barbara Carminati,et al. User similarities on social networks , 2013, Social Network Analysis and Mining.
[38] Tong Wang,et al. Detecting Patterns of Crime with Series Finder , 2013, AAAI.
[39] John David Elijah Sandig,et al. Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis , .
[40] Yagnik Ankur,et al. Oulier Analysis Using Frequent Pattern Mining – A Review , 2013 .
[41] Jennifer Widom,et al. SimRank: a measure of structural-context similarity , 2002, KDD.
[42] Revatthy Krishnamurthy,et al. Survey of Data Mining Techniques on Crime Data Analysis , 2012 .
[43] G. A. Ali. Identifying Terrorist Affiliations through Social Network Analysis: Using Data Mining Techniques , 2016 .
[44] Ioannis Anagnostopoulos,et al. Discovering similar Twitter accounts using semantics , 2015, Eng. Appl. Artif. Intell..
[45] Mohammad Shamsul Arefin,et al. Developing a framework for analyzing social networks to identify human behaviours , 2016, 2016 2nd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE).
[46] Matthew Michelson,et al. Tweet Disambiguate Entities Retrieve Folksonomy SubTree Step 1 : Discover Categories Generate Topic Profile from SubTrees Step 2 : Discover Profile Topic Profile : “ English Football ” “ World Cup ” , 2010 .
[47] L. Freeman,et al. Centrality in valued graphs: A measure of betweenness based on network flow , 1991 .
[48] Max Mühlhäuser,et al. Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).
[49] M. Conway. Introduction: terrorism and contemporary mediascapes – reanimating research on media and terrorism , 2012 .