An extraction and unification methodology for social networks data: an application to public security
暂无分享,去创建一个
Abdelmajid Ben Hamadou | Amal Rekik | Salma Jamoussi | Atika Mbarek | Hanen Ameur | Amal Abid | A. B. Hamadou | Salma Jamoussi | Hanen Ameur | Amal Rekik | Amal Abid | Atika Mbarek
[1] Akhilesh Tiwari,et al. Terrorism in the Cyber Space: The New Battlefield , 2016 .
[2] Michael J. Paul,et al. Session Introduction , 2016, PSB.
[3] G. Eysenbach,et al. Social Media: A Review and Tutorial of Applications in Medicine and Health Care , 2014, Journal of medical Internet research.
[4] Omar El Beqqali,et al. Cybercrime profiling: Text mining techniques to detect and predict criminal activities in microblog posts , 2015, 2015 10th International Conference on Intelligent Systems: Theories and Applications (SITA).
[5] Wu He,et al. International Journal of Information Management Social Media Competitive Analysis and Text Mining: a Case Study in the Pizza Industry , 2022 .
[6] Pasquale De Meo,et al. Web Data Extraction , Applications and Techniques : A Survey , 2010 .
[7] Alessandro Flammini,et al. Predicting online extremism, content adopters, and interaction reciprocity , 2016, SocInfo.