共 9 条
- [1] Abbasi Ahmed, 2007, 2007 IEEE Intelligence and Security Informatics, P282, DOI 10.1109/ISI.2007.379486
- [2] Circadian Typology: A Comprehensive Review [J]. CHRONOBIOLOGY INTERNATIONAL, 2012, 29 (09) : 1153 - 1175
- [3] [Anonymous], 2009, TWITTER SENTIMENT CL
- [4] Brynielsson J., 2013, Security Informatics, V2, P11, DOI DOI 10.1186/2190-8532-2-11
- [5] Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards [J]. 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 850 - 857
- [6] Johansson F., 2015, SECURITY INFORM, V4, P1, DOI DOI 10.1186/S13388-015-0022-Z
- [7] Kourtis I., 2011, CLEF 2011 P C MULT M
- [8] Layton R., 2010, Proceedings Second Cybercrime and Trustworthy Computing Workshop (CTC 2010), P1, DOI 10.1109/CTC.2010.17
- [9] On the Feasibility of Internet-Scale Author Identification [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 300 - 314