Social Cyber-Security
暂无分享,去创建一个
Huan Liu | Kathleen M. Carley | Nitin Agarwal | Guido Cervone | N. Agarwal | Huan Liu | G. Cervone | Nitin Agarwal
[1] Kathleen M. Carley,et al. Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter , 2017, PloS one.
[2] Kathleen M. Carley,et al. A social-event based approach to sentiment analysis of identities and behaviors in text , 2016, The Journal of Mathematical Sociology.
[3] Kathleen M. Carley,et al. Mining online communities to inform strategic messaging: practical methods to identify community-level insights , 2017, Computational and Mathematical Organization Theory.
[4] Derek S. Reveron,et al. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World , 2012 .
[5] W. Bennett,et al. The Personalization of Politics , 2012 .
[6] Anthony H. Cordesman,et al. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland , 2001 .
[7] Jon M. Kleinberg,et al. Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.
[8] Reza Zafarani,et al. Analyzing Behavior of the Influentials Across Social Media , 2012 .
[9] Huan Liu,et al. Text Analytics in Social Media , 2012, Mining Text Data.
[10] Huan Liu,et al. Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose , 2013, ICWSM.
[11] Wei Wei,et al. High-dimensional network analytics: mapping topic networks in Twitter data during the Arab Spring , 2016, Big Data over Networks.
[12] Kathleen M. Carley,et al. From Tweets to Intelligence: Understanding the Islamic Jihad Supporting Community on Twitter , 2016, SBP-BRiMS.
[13] R. Entman. Framing Bias: Media in the Distribution of Power , 2007 .
[14] Micael Dahlen,et al. Following the Fashionable Friend: The Power of Social Media , 2011, Journal of Advertising Research.
[15] Kathleen M. Carley,et al. Crowd sourcing disaster management: The complex nature of Twitter usage in Padang Indonesia , 2016 .
[16] Qunying Huang,et al. Using Twitter for tasking remote-sensing data collection and damage assessment: 2013 Boulder flood case study , 2016 .
[17] Huan Liu,et al. Tracing Fake-News Footprints: Characterizing Social Media Messages by How They Propagate , 2018, WSDM.
[18] John S. Seiter,et al. Persuasion: Social Inflence and Compliance Gaining , 2015 .
[19] Nitin Agarwal,et al. Social Cyber Forensics Approach to Study Twitter's and Blogs' Influence on Propaganda Campaigns , 2017, SBP-BRiMS.
[20] Cass R. Sunstein,et al. #Republic: Divided Democracy in the Age of Social Media , 2017 .
[21] Huan Liu,et al. Exploring characteristics of suspended users and network stability on Twitter , 2016, Social Network Analysis and Mining.