Detecting Users Who Share Extremist Content on Twitter
暂无分享,去创建一个
[1] Lisa Singh,et al. Using Network Flows to Identify Users Sharing Extremist Content on Social Media , 2017, PAKDD.
[2] Lisa Singh,et al. Identification of extremism on Twitter , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[3] Matthew Rowe,et al. Mining Pro-ISIS Radicalisation Signals from Social Media Users , 2016, ICWSM.
[4] Saif Mohammad,et al. Stance and Sentiment in Tweets , 2016, ACM Trans. Internet Techn..
[5] Cody Buntain,et al. Evaluating Public Response to the Boston Marathon Bombing and Other Acts of Terrorism through Twitter , 2016, ICWSM.
[6] Ashish Sureka,et al. Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats , 2015, ArXiv.
[7] Richard Frank,et al. Sentiment crawling: Extremist content collection through a sentiment analysis guided web-crawler , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[8] J. Alfredo Sánchez,et al. Sentiment Groups as Features of a Classification Model Using a Spanish Sentiment Lexicon: A Hybrid Approach , 2015, MCPR.
[9] Uuf Brajawidagda,et al. Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks , 2015, DG.O.
[10] J. M. Berger,et al. The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter , 2015 .
[11] Vincent A. Knight,et al. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack , 2014, Social Network Analysis and Mining.
[12] Melissa J. Krauss,et al. Characterizing the Followers and Tweets of a Marijuana-Focused Twitter Handle , 2014, Journal of medical Internet research.
[13] B. Ganor,et al. Who matters online: measuring influence, evaluating content and countering violent extremism in online social networks , 2013 .
[14] W. C. Hale,et al. Extremism on the World Wide Web: a research review , 2012 .
[15] Jong Kim,et al. Spam Filtering in Twitter Using Sender-Receiver Relationship , 2011, RAID.
[16] Owen Rambow,et al. Sentiment Analysis of Twitter Data , 2011 .
[17] Tiejun Zhao,et al. Target-dependent Twitter Sentiment Classification , 2011, ACL.
[18] Wei Xu,et al. Toward worm detection in online social networks , 2010, ACSAC '10.
[19] Junlan Feng,et al. Robust Sentiment Detection on Twitter from Biased and Noisy Data , 2010, COLING.
[20] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[21] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[22] Hyungkyu Lee,et al. Classification of web robots: An empirical study based on over one billion requests , 2009, Comput. Secur..
[23] Virgílio A. F. Almeida,et al. Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.
[24] Hsinchun Chen,et al. US domestic extremist groups on the Web: link and content analysis , 2005, IEEE Intelligent Systems.
[25] Bing Liu,et al. Mining and summarizing customer reviews , 2004, KDD.
[26] Jeonghee Yi,et al. Sentiment analysis: capturing favorability using natural language processing , 2003, K-CAP '03.
[27] D. Byman. ISIS goes global , 2016 .
[28] Harith Alani,et al. Contextual semantics for sentiment analysis of Twitter , 2016, Inf. Process. Manag..
[29] Martin Bouchard,et al. Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor , 2014, Computational Models of Complex Systems.
[30] Jianwen Zhang,et al. Sentiment Topic Model with Decomposed Prior , 2013, SDM.
[31] Jong Kim,et al. WarningBird: Detecting Suspicious URLs in Twitter Stream , 2012, NDSS.
[32] Patrick Paroubek,et al. Twitter as a Corpus for Sentiment Analysis and Opinion Mining , 2010, LREC.
[33] E. Kirda,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Security All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks , 2022 .