共 28 条
[1]
Alfifi M., 2017, BADLY EVOLVED EXPLOR, P218
[2]
[Anonymous], 2018, N.Y. TiMEs
[3]
Detecting Jihadist Messages on Twitter
[J].
2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC),
2015,
:161-164
[4]
Carrington P.J., 2011, The SAGE Handbook of Social Network Analysis, P236, DOI [10.4135/9781446294413, DOI 10.4135/9781446294413]
[5]
Chen C., 2004, Tech. Rep
[6]
Collobert R., 2008, Proceedings of the 25th international conference on Machine learning, V25, P160, DOI DOI 10.1145/1390156.1390177
[7]
De Choudhury M, 2013, P INT AAAI C WEB SOC, V7, P128, DOI [10.1609/icwsm.v7i1.14432, DOI 10.1609/ICWSM.V7I1.14432]
[8]
Devyatkin D, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P188, DOI 10.1109/ISI.2017.8004907
[10]
Elzinga Paul, 2010, 2010 IEEE International Conference on Intelligence and Security Informatics (ISI 2010), P77, DOI 10.1109/ISI.2010.5484773