Visualization and Detection of Multiple Aliases in Social Media

Monitoring and analysis of web forums are becoming important for intelligence analysts around the globe since terrorists and extremists are using forums for spreading propaganda and communicating w ...

[1]  Jörg Kindermann,et al.  Authorship Attribution with Support Vector Machines , 2003, Applied Intelligence.

[2]  Dawn Xiaodong Song,et al.  On the Feasibility of Internet-Scale Author Identification , 2012, 2012 IEEE Symposium on Security and Privacy.

[3]  Andreas Fellner,et al.  Treating Temporal Uncertainties Of Complex Hierarchical Data Visually , 2006 .

[4]  Ben Shneiderman,et al.  Readings in information visualization - using vision to think , 1999 .

[5]  Ben Shneiderman,et al.  Interactive Entity Resolution in Relational Data: A Visual Analytic Tool and Its Evaluation , 2008, IEEE Transactions on Visualization and Computer Graphics.

[6]  William C. Hetzel,et al.  The complete guide to software testing , 1984 .

[7]  William W. Cohen,et al.  A Comparison of String Metrics for Matching Names and Records , 2003 .

[8]  Daniel A. Keim,et al.  Challenges in Visual Data Analysis , 2006, Tenth International Conference on Information Visualisation (IV'06).

[9]  Uffe Kock Wiil,et al.  Extended approximate string matching algorithms to detect name aliases , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[10]  Hsinchun Chen,et al.  A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006 .

[11]  I. Veldman Matching profiles from social network sites : similarity calculations with social network support , 2009 .

[12]  James H. Martin,et al.  Speech and language processing: an introduction to natural language processing, computational linguistics, and speech recognition, 2nd Edition , 2000, Prentice Hall series in artificial intelligence.

[13]  Reiter K. Michael,et al.  Anonymous Web Transactions with Crowds , 1999 .

[14]  Johan Dahlin,et al.  Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[15]  Patrick Juola,et al.  Authorship Attribution , 2008, Found. Trends Inf. Retr..

[16]  Atro Voutilainen Part-of-Speech Tagging , 2005 .

[17]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[18]  Kristin A. Cook,et al.  Illuminating the Path: The Research and Development Agenda for Visual Analytics , 2005 .

[19]  Jasmine Novak,et al.  Anti-aliasing on the web , 2004, WWW '04.

[20]  Jane. Corbin Al-Qaeda: In Search of the Terror Network that Threatens the World , 2002 .

[21]  D. Pressman,et al.  Risk Assessment Decisions for Violent Political Extremism 2009-02 , 2009 .

[22]  Jeffrey Heer,et al.  prefuse: a toolkit for interactive information visualization , 2005, CHI.

[23]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[24]  Rajesh V. Argiddi,et al.  Author Identification: An Approach based on Code Feature Metrics using Decision Trees , 2013 .

[25]  William E. Winkler,et al.  AN APPLICATION OF THE FELLEGI-SUNTER MODEL OF RECORD LINKAGE TO THE 1990 U.S. DECENNIAL CENSUS , 1987 .

[26]  Ido Dagan,et al.  Feature instability as a criterion for selecting potential style markers: Special Topic Section on Computational Analysis of Style , 2006 .

[27]  Ahmed K. Elmagarmid,et al.  Duplicate Record Detection: A Survey , 2007, IEEE Transactions on Knowledge and Data Engineering.

[28]  Hsinchun Chen,et al.  Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace , 2008, TOIS.

[29]  Efstathios Stamatatos,et al.  Author Identification Using Semi-supervised Learning - Notebook for PAN at CLEF 2011 , 2011, CLEF.

[30]  Efstathios Stamatatos,et al.  A survey of modern authorship attribution methods , 2009, J. Assoc. Inf. Sci. Technol..