Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 17
Page No. 7459 - 7464

Terrorist Affiliations Identifying Through Twitter Social Media Analysis Using Data Mining and Web Mapping Techniques

Authors : Muhanad Abdul Elah Al-Khalisy and Hashem B. Jehlol

References

Balamurugan, R. and D.S. Pushpa, 2015. A review on various text mining techniques and algorithms. Proceedings of the 2nd International Conference on Recent Innovations in Science, Engineering and Management, November 22, 2015, JNU Convention Center, New Delhi, India, ISBN:978-81-931039-9-9, pp: 837-848.

Bigler, A., O. Ertz, D. Rappo, S. Composto and F. Joerin et al., 2017. GEOPOLL-integrate cartographic questions in web forms, polls or surveys. Proceedings of the Conference on Free and Open Source Software for Geospatial (FOSS4G’17) Vol. 17, August 14-19, 2017, Seaport Hotel & World Trade Center, Boston, Massachusetts, pp: 1-9.

Ende, B.V.D., 2016. Understanding and combatting terrorist networks: Coupling social media mining with social network analysis. Proceedings of the 14th Conference on Australian Information Security Management, December 5-6, 2016, Edith Cowan University, Joondalup, Western Australia, pp: 48-51.

Ghajar-Khosravi, S., P. Kwantes, N. Derbentseva and L. Huey, 2016. Quantifying salient concepts discussed in social media content: An analysis of tweets posted by ISIS fangirls. J. Terrorism Res., 7: 79-90.
Direct Link  |  

Isah, H., P. Trundle and D. Neagu, 2014. Social media analysis for product safety using text mining and sentiment analysis. Proceedings of the 14th UK Workshop on Computational Intelligence (UKCI’14), September 8-10, 2014, IEEE, Bradford, UK., ISBN:978-1-4799-5538-1, pp: 1-7.

Kale, P., R. Ranjan, T. Bagade, A. Sapkal and K. Singh, 2017. Sentiment analysis of social media data. Intl. J. Emerging Trends Technol. Comput. Sci., 6: 151-156.
Direct Link  |  

Kocharekar, M. and U. Jadhav, 2017. Detecting terrorist activities using sentiment analysis in a distributed system. Intl. J. Sci. Res. Eng. Trends, 6: 285-287.
Direct Link  |  

Koplow, J.L., 2015. Designation of North Korea as a state sponsor of cyberterrorism, on. SMU. Sci. Tech. L. Rev., 18: 405-405.
Direct Link  |  

Margono, H., X. Yi and G.K. Raikundalia, 2014. Mining Indonesian cyber bullying patterns in social networks. Proceedings of the 37th Conference on Australasian Computer Science Vol. 147, January 20-23, 2014, Australian Computer Society, Inc, Auckland, New Zealand, ISBN:978-1-921770-30-2, pp: 115-124.

Maynard, D., I. Roberts, M.A. Greenwood, D. Rout and K. Bontcheva, 2017. A framework for real-time semantic social media analysis. Web Semant. Sci. Serv. Agents World Wide Web, 44: 75-88.
CrossRef  |  Direct Link  |  

Pasini, T. and R. Navigli, 2017. Train-O-Matic: Large-scale supervised word sense disambiguation in multiple languages without manual training data. Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, September 7-11, 2017, Association for Computational Linguistics, Copenhagen, Denmark, pp: 78-88.

Wadhwa, P. and M.P.S. Bhatia, 2014. Discovering hidden networks in on-line social networks. Intl. J. Intell. Syst. Appl., 6: 44-54.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved