Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter
暂无分享,去创建一个
Kathleen M. Carley | Kenneth Joseph | Kathleen M Carley | K. Joseph | Matthew C Benigni | M. Benigni
[1] FRaNk G. hoFFMaN,et al. Hybrid Warfare and Challenges , 2009 .
[2] Ulrike von Luxburg,et al. A tutorial on spectral clustering , 2007, Stat. Comput..
[3] Burr Settles,et al. Active Learning Literature Survey , 2009 .
[4] Kathleen M. Carley,et al. Destabilizing Terrorist Networks , 1998 .
[5] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[6] K. Senne,et al. Covert Network Detection , 2013 .
[7] Huan Liu,et al. Leveraging social media networks for classification , 2011, Data Mining and Knowledge Discovery.
[8] J. M. Berger,et al. The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter , 2015 .
[9] Kathleen M. Carley. A Dynamic Network Approach to the Assessment of Terrorist Groups and the Impact of Alternative Courses of Action , 2006 .
[10] Massimo Marchiori,et al. How the science of complex networks can help developing strategies against terrorism , 2004 .
[11] Kathleen M. Carley,et al. Destabilizing Dynamic Covert Networks , 2003 .
[12] Shilpa Chakravartula,et al. Complex Networks: Structure and Dynamics , 2014 .
[13] H LoganMatthew,et al. Lone Wolf Killers: A Perspective on Overvalued Ideas , 2014 .
[14] Eric Eaton,et al. A Spin-Glass Model for Semi-Supervised Community Detection , 2012, AAAI.
[15] N. Ellison,et al. Social capital, self-esteem, and use of online social network sites: A longitudinal analysis , 2008 .
[16] Seumas Miller,et al. Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States , 2012 .
[17] David A. Lake. Rational Extremism: Understanding Terrorism in the Twenty-first Century , 2002 .
[18] M E J Newman,et al. Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.
[19] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[20] Jure Leskovec,et al. Community Detection in Networks with Node Attributes , 2013, 2013 IEEE 13th International Conference on Data Mining.
[21] Kathleen M. Carley,et al. Relating semantic similarity and semantic association to how humans label other people , 2016, NLP+CSS@EMNLP.
[22] Huan Liu,et al. Uncoverning Groups via Heterogeneous Interaction Analysis , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[23] S. Berg. Snowball Sampling—I , 2006 .
[24] Huan Liu,et al. Discovering Overlapping Groups in Social Media , 2010, 2010 IEEE International Conference on Data Mining.
[25] Brendan T. O'Connor,et al. Demographic Dialectal Variation in Social Media: A Case Study of African-American English , 2016, EMNLP.
[26] S. Koschade. A Social Network Analysis of Jemaah Islamiyah: The Applications to Counterterrorism and Intelligence , 2006 .
[27] Eric T. G. Wang,et al. Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories , 2006, Decis. Support Syst..
[28] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[29] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[30] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[31] Timothy Baldwin,et al. langid.py: An Off-the-shelf Language Identification Tool , 2012, ACL.
[32] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[33] Seumas Miller,et al. Rethinking ‘Five Eyes’ Security Intelligence Collection Policies and Practice Post Snowden , 2016 .
[34] Andy Liaw,et al. Classification and Regression by randomForest , 2007 .
[35] Kathleen M. Carley,et al. Culture, Networks, Twitter and foursquare: Testing a Model of Cultural Conversion with Social Media Data , 2015, ICWSM.
[36] Yan Huang,et al. Anchoring and Agreement in Syntactic Annotations , 2016, EMNLP.
[37] Yannick Veilleux-Lepage,et al. Paradigmatic Shifts in Jihadism in Cyberspace: The Emerging Role of Unaffiliated Sympathizers in Islamic State’s Social Media Strategy , 2016 .
[38] Yan Huang,et al. Bias and Agreement in Syntactic Annotations , 2016, ArXiv.
[39] Benjamin A. Miller,et al. Eigenspace analysis for threat detection in social networks , 2011, 14th International Conference on Information Fusion.
[40] John Bohannon,et al. Counterterrorism's new tool: 'metanetwork' analysis. , 2009, Science.
[41] Inderjit S. Dhillon,et al. Co-clustering documents and words using bipartite spectral graph partitioning , 2001, KDD '01.
[42] Stephen J. Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .
[43] Yiannis Kompatsiaris,et al. Community detection in Social Media , 2012, Data Mining and Knowledge Discovery.