Social Cyber Forensics Approach to Study Twitter's and Blogs' Influence on Propaganda Campaigns
暂无分享,去创建一个
[1] Michael Bazzell,et al. Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information , 2012 .
[2] Propaganda and How to Recognize It , 2005 .
[3] Nitin Agarwal,et al. Analyzing Flash Mobs in Cybernetic Space and the Imminent Security Threats A Collective Action Based Theoretical Perspective on Emerging Sociotechnical Behaviors , 2015, AAAI Spring Symposia.
[4] Edgar Weippl,et al. Social Network Forensics : Tapping the Data Pool of Social Networks , 2011 .
[5] Nitin Agarwal,et al. Focal structures analysis: identifying influential sets of individuals in a social network , 2016, Social Network Analysis and Mining.
[6] Zarina Shukur,et al. Systematic Literature Review on Data Carving in Digital Forensic , 2013 .
[7] Digambar Povar,et al. Forensic Data Carving , 2010, ICDF2C.
[8] R. S. Guadron,et al. Computer forensics , 2016 .
[9] William H. Allen. Computer Forensics , 2005, IEEE Secur. Priv..
[10] Clayton Fink,et al. Complex contagions and the diffusion of popular Twitter hashtags in Nigeria , 2015, Social Network Analysis and Mining.
[11] Robert Faris,et al. Mapping the Arabic Blogosphere: Politics, Culture, and Dissent , 2014 .
[12] Philip S. Yu,et al. Identifying the influential bloggers in a community , 2008, WSDM '08.