Using machine learning to identify jihadist messages on Twitter

Jihadist groups like ISIS are spreading online propaganda using various forms of social media such as Twitter and YouTube. One of the most common approaches to stop these groups is to suspend accou ...

[1]  Alok N. Choudhary,et al.  Twitter Trending Topic Classification , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.

[2]  Aba-Sah Dadzie,et al.  Nerding out on twitter: fun, patriotism and #curiosity , 2013, WWW.

[3]  Hakan Ferhatosmanoglu,et al.  Short text classification in twitter to improve information filtering , 2010, SIGIR.

[4]  Aba-Sah Dadzie,et al.  Ageing factor:a potential altmetric for observing events and attention spans in microblogs , 2012 .

[5]  Thorsten Joachims,et al.  Text Categorization with Support Vector Machines: Learning with Many Relevant Features , 1998, ECML.

[6]  J. Kent Information gain and a general measure of correlation , 1983 .

[7]  Stephen V. Stehman,et al.  Selecting and interpreting measures of thematic classification accuracy , 1997 .

[8]  Timothy W. Finin,et al.  Why we twitter: understanding microblogging usage and communities , 2007, WebKDD/SNA-KDD '07.

[9]  Ethem Alpaydin,et al.  Introduction to machine learning , 2004, Adaptive computation and machine learning.

[10]  Yoram Singer,et al.  Logistic Regression, AdaBoost and Bregman Distances , 2000, Machine Learning.

[11]  Xiaojin Zhu,et al.  Introduction to Semi-Supervised Learning , 2009, Synthesis Lectures on Artificial Intelligence and Machine Learning.

[12]  Mihai Surdeanu,et al.  The Stanford CoreNLP Natural Language Processing Toolkit , 2014, ACL.

[13]  Walid Magdy,et al.  #FailedRevolutions: Using Twitter to study the antecedents of ISIS support , 2015, First Monday.

[14]  Christopher S. G. Khoo,et al.  Aspect-based sentiment analysis of movie reviews on discussion boards , 2010, J. Inf. Sci..

[15]  Dan Zarrella,et al.  The Social Media Marketing Book , 2009 .

[16]  James L. Regens,et al.  Islamic Radicalism and Global Jihad , 2009 .

[17]  Dorian Pyle,et al.  Data Preparation for Data Mining , 1999 .

[18]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[19]  Karin M. Verspoor,et al.  BioLemmatizer: a lemmatization tool for morphological processing of biomedical text , 2012, J. Biomed. Semant..

[20]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[21]  David D. Lewis,et al.  Naive (Bayes) at Forty: The Independence Assumption in Information Retrieval , 1998, ECML.

[22]  Biju Issac,et al.  Case Studies in Secure Computing: Achievements and Trends , 2014 .

[23]  Peter Jackson,et al.  Natural language processing for online applications : text retrieval, extraction and categorization , 2002 .