Detecting Users Who Share Extremist Content on Twitter

[1]  Lisa Singh,et al.  Using Network Flows to Identify Users Sharing Extremist Content on Social Media , 2017, PAKDD.

[2]  Lisa Singh,et al.  Identification of extremism on Twitter , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[3]  Matthew Rowe,et al.  Mining Pro-ISIS Radicalisation Signals from Social Media Users , 2016, ICWSM.

[4]  Saif Mohammad,et al.  Stance and Sentiment in Tweets , 2016, ACM Trans. Internet Techn..

[5]  Cody Buntain,et al.  Evaluating Public Response to the Boston Marathon Bombing and Other Acts of Terrorism through Twitter , 2016, ICWSM.

[6]  Ashish Sureka,et al.  Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats , 2015, ArXiv.

[7]  Richard Frank,et al.  Sentiment crawling: Extremist content collection through a sentiment analysis guided web-crawler , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[8]  J. Alfredo Sánchez,et al.  Sentiment Groups as Features of a Classification Model Using a Spanish Sentiment Lexicon: A Hybrid Approach , 2015, MCPR.

[9]  Uuf Brajawidagda,et al.  Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks , 2015, DG.O.

[10]  J. M. Berger,et al.  The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter , 2015 .

[11]  Vincent A. Knight,et al.  Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack , 2014, Social Network Analysis and Mining.

[12]  Melissa J. Krauss,et al.  Characterizing the Followers and Tweets of a Marijuana-Focused Twitter Handle , 2014, Journal of medical Internet research.

[13]  B. Ganor,et al.  Who matters online: measuring influence, evaluating content and countering violent extremism in online social networks , 2013 .

[14]  W. C. Hale,et al.  Extremism on the World Wide Web: a research review , 2012 .

[15]  Jong Kim,et al.  Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.

[16]  Owen Rambow,et al.  Sentiment Analysis of Twitter Data , 2011 .

[17]  Tiejun Zhao,et al.  Target-dependent Twitter Sentiment Classification , 2011, ACL.

[18]  Wei Xu,et al.  Toward worm detection in online social networks , 2010, ACSAC '10.

[19]  Junlan Feng,et al.  Robust Sentiment Detection on Twitter from Biased and Noisy Data , 2010, COLING.

[20]  Alex Hai Wang,et al.  Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[21]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[22]  Hyungkyu Lee,et al.  Classification of web robots: An empirical study based on over one billion requests , 2009, Comput. Secur..

[23]  Virgílio A. F. Almeida,et al.  Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.

[24]  Hsinchun Chen,et al.  US domestic extremist groups on the Web: link and content analysis , 2005, IEEE Intelligent Systems.

[25]  Bing Liu,et al.  Mining and summarizing customer reviews , 2004, KDD.

[26]  Jeonghee Yi,et al.  Sentiment analysis: capturing favorability using natural language processing , 2003, K-CAP '03.

[27]  D. Byman ISIS goes global , 2016 .

[28]  Harith Alani,et al.  Contextual semantics for sentiment analysis of Twitter , 2016, Inf. Process. Manag..

[29]  Martin Bouchard,et al.  Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor , 2014, Computational Models of Complex Systems.

[30]  Jianwen Zhang,et al.  Sentiment Topic Model with Decomposed Prior , 2013, SDM.

[31]  Jong Kim,et al.  WarningBird: Detecting Suspicious URLs in Twitter Stream , 2012, NDSS.

[32]  Patrick Paroubek,et al.  Twitter as a Corpus for Sentiment Analysis and Opinion Mining , 2010, LREC.

[33]  E. Kirda,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Security All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks , 2022 .