Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities
Publisher
Springer New York
Reference13 articles.
1. Abbasi A, Chen H (2008) Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7:1–7:29
2. Asur S, Huberman BA (2010) Predicting the future with social media. In: Proceedings of the 2010 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology – volume 01, WI-IAT’10. Toronto. IEEE Computer Society, Washington, DC, pp 492–499
3. Brynielsson J, Horndahl A, Johansson F, Kaati L, Mårtenson C, Svenson P (2012) Analysis of weak signals for detecting lone wolf terrorists. In: Proceedings of the European intelligence and security informatics conference 2012, Odense, pp 197–204
4. Chen HC, Goldberg MK, Magdon-Ismail M (2004) Identifying multi-ID users in open forums. In: Intelligence and security informatics. Springer, Berlin/New York, pp 176–186
5. Dahlin J, Johansson F, Kaati L, Mårtenson C, Svenson P (2012) Combining entity matching techniques for detecting extremist behavior on discussion boards. In: ASONAM, Istanbul, pp 850–857