Author:
Ameur Hanen,Rekik Amal,Jamoussi Salma,Hamadou Abdelmajid Ben
Subject
Human-Computer Interaction,Software
Reference43 articles.
1. Radicalization into violent extremism i: A review of social science theories;Borum;J. Strat. Secur.,2011
2. Terrorism in the cyber space: The new battlefield;Gupta;Int. J. Adv. Res. Comput. Commun. Eng.,2016
3. Semantic uplift criminal data from social networks, ICWI;Santos;IADIS,2014
4. A probabilistic generative model for mining cybercriminal networks from online social media;Lau;IEEE Computational intelligence magazine,2014
5. Cybercrime profiling: Text mining techniques to detect and predict criminal activities in microblog posts;Alami,2015
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献