共 10 条
[1]
Asur S., 2010, Proceedings 2010 IEEE/ACM International Conference on Web Intelligence-Intelligent Agent Technology (WI-IAT), P492, DOI 10.1109/WI-IAT.2010.63
[2]
Feldman James Sanger Ronen, 2007, TEXT MINING HDB
[3]
Gunn S.R., 1998, ISIS TECH REP, V14, P5
[4]
Han dan J., 2006, DATA MINING CONCEPTS
[5]
Han J, 2012, MOR KAUF D, P1
[6]
Jiang Yunliang, 2010, Proceedings 2010 International Conference on Web Information Systems and Mining (WISM 2010), P257, DOI 10.1109/WISM.2010.14
[7]
Liang J. Z., 2004, P IEEE 3 INT C MACH
[8]
McCord M., 2011, SPAM DETECTION TWITT
[9]
Prasetijo AB, 2017, 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), P45, DOI 10.1109/ICITACEE.2017.8257673
[10]
Situngkir, 2011, SPREAD HOAX SOCIAL M