Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
11 SI
Page No.
8690 - 8694
References
An, T.H., 2015. The distribution of vicious comments written on Naver’s articles. Korean Stud. Korean Lang. Soc., 1: 153-174.
Hong, J.J., 2015. Internet malicious comment detection technique. Master Thesis, Soongsil University, Seoul, South Korea.
Kim, C.J., 2015. Estimating relevance of SNS comments using SVM. Korea Inf. Sci. Soc., 1: 775-777.
Kim, H.J., S.H. Han and S.J. Lee, 2008. Liability for defamation in internet portals. Seoul National Univ. Technol. Law Center Law Technol., 4: 3-17.
Kim, K.C., 2011. Limits of mandatory verification of user identity under information and communications network act-A tension between technology and law. Law Technol., 7: 25-41.
Kim, M. and S. Lee, 2014. Measures of abnormal user activities in online comments based on cosine similarity. J. Korea Inst. Inf. Secur. Cryptology, 24: 335-343.
CrossRef | Direct Link | Kim, S.C. and H.U. Jung, 2009. The present situation and problems of malicious comments on internet. Kyungwon Laws, 2: 47-63.
Lee, S.S. and K.H. Kim, 2006. Problems of comments and responsibility of internet media. J. Media Law Ethics Policy Res., 5: 385-415.