1. P. Engel, "ISIS has mastered a crucial recruiting tactic no terrorist group has ever conquered," Business Insider, 09-May-2015. [Online]. Available http://www.businessinsider.com/isis-is-revolutionizing-international-terrorism-2015-5. [Accessed: 16-Mar-2016].
2. H. Young, "The digital language divide," 2014. [Online]. Available: http://labs.theguardian.com/digital-language-divide/. [Accessed: 27-Nov-2016].
3. G. C. | in T. D. Maker, September 16, 2013, and 8:43 Am Pst, "Use big data to fight cybercrime," TechRepublic. [Online]. Available: https://www.techrepublic.com/blog/tech-decision-maker/use-big-data-to-fight-cybercrime/. [Accessed: 12-Nov-2017].
4. L. Firte, C. Lemnaru, and R. Potolea, "Spam detection filter using KNN algorithm and resampling," in 2010 IEEE International Conference on Intelligent Computer Communication and Processing (ICCP), 2010, pp. 27--33.
5. L. Pearl and M. Steyvers, "Detecting authorship deception: a supervised machine learning approach using author writeprints," LLC, vol. 27, pp. 183--196, 2012.