1. Toward finding malicious cyber discussions in social media;Lippmann R. P.;Proceedings of AAAI,2017
2. K. Jones , J. R. Nurse , and S. Li , " Behind the mask: A computational study of Anonymous' presence on Twitter," in Proceedings of ICWSM 2020 . AAAI , 2020 , pp. 327 -- 338 . [Online]. Available : https://aaai.org/ojs/index.php/ICWSM/article/view/7303 K. Jones, J. R. Nurse, and S. Li, "Behind the mask: A computational study of Anonymous' presence on Twitter," in Proceedings of ICWSM 2020. AAAI, 2020, pp. 327-- 338. [Online]. Available: https://aaai.org/ojs/index.php/ICWSM/article/view/7303
3. The World of Defacers: Looking Through the Lens of Their Activities on Twitter
4. Automatic Detection of Cyber Security Related Accounts on Online Social Networks
5. A machine learning approach to Twitter user classification;Pennacchiotti M.;Proceedings of ICWSM,2011