Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abbasi A, Chen H (2008) Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7:1–7:29
Asur S, Huberman BA (2010) Predicting the future with social media. In: Proceedings of the 2010 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology – volume 01, WI-IAT’10. Toronto. IEEE Computer Society, Washington, DC, pp 492–499
Brynielsson J, Horndahl A, Johansson F, Kaati L, Mårtenson C, Svenson P (2012) Analysis of weak signals for detecting lone wolf terrorists. In: Proceedings of the European intelligence and security informatics conference 2012, Odense, pp 197–204
Chen HC, Goldberg MK, Magdon-Ismail M (2004) Identifying multi-ID users in open forums. In: Intelligence and security informatics. Springer, Berlin/New York, pp 176–186
Dahlin J, Johansson F, Kaati L, Mårtenson C, Svenson P (2012) Combining entity matching techniques for detecting extremist behavior on discussion boards. In: ASONAM, Istanbul, pp 850–857
Gruhl D, Guha R, Kumar R, Novak J, Tomkins A (2005) The predictive power of online chatter. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining, KDD’05, Chicago. ACM, New York, pp 78–87
Juola P (2006) Authorship attribution. Found Trends Inf Retr 1(3):233–334
Narayanan A, Paskov H, Gong N, Bethencourt J, Stefanov E, Shin E, Song D (2012) On the feasibility of internet-scale author identification. In: 2012 I.E. symposium on security and privacy (SP), San Francisco, pp 300–314
Novak J, Raghavan P, Tomkins A (2004) Anti-aliasing on the web. In: Proceedings of the 13th international conference on world wide web, WWW’04. New York. ACM, New York, pp 30–39
Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol 60(3):538–556
Veijalainen J, Semenov A, Kyppö J (2010) Tracing potential school shooters in the digital sphere. In: ISA, Miyazaki, pp 163–178
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge/New York
Zheng R, Li J, Chen H, Huang Z (2006) A framework for authorship identification of online messages: writing-style features and classification techniques. J Am Soc Inf Sci Technol 57(3):378–393
Acknowledgments
This research was financially supported by Vinnova through the Vinnmer programme.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media LLC, part of Springer Nature
About this entry
Cite this entry
Kaati, L. (2018). Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_172
Download citation
DOI: https://doi.org/10.1007/978-1-4939-7131-2_172
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-7130-5
Online ISBN: 978-1-4939-7131-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering