Skip to main content

Malicious Event Detecting in Twitter Communities

  • Conference paper
  • First Online:
Intelligent Interactive Multimedia Systems and Services 2016

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 55))

Abstract

Social networking services gain more often interest for research goals in several fields and applications. The number of active users of social networking services like Twitter raised up to 320 million per month in 2015. The rich knowledge that has accumulated in the social sites enables to catch the reflection of real world events. In this work we present a general framework for event detection from Twitter. The framework implements techniques that can be exploited for malicious event detection in Twitter communities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.gallup.com/.

References

  1. Diakopoulos, N., Naaman, M., Kivran-Swaine, F.: Diamonds in the rough: social media visual analytics for journalistic inquiry. In: 2010 IEEE Symposium on Visual Analytics Science and Technology (VAST), pp. 115–122, Oct 2010

    Google Scholar 

  2. Yardi, S., Boyd, D.: Tweeting from the town square: measuring geographic local networks. In: International Conference on Weblogs and Social Media. American Association for Artificial Intelligence. http://research.microsoft.com/apps/pubs/default.aspx?id=122433 (2010). Accessed May 2010

  3. Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: Real-time event detection by social sensors. In: Proceedings of the 19th International Conference on World Wide Web, ser. WWW ’10, pp. 851–860. ACM, New York, NY, USA (2010). http://doi.acm.org/10.1145/1772690.1772777

  4. Naaman, M., Boase, J., Lai, C.-H.: Is it really about me?: message content in social awareness streams. In: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work, ser. CSCW ’10, pp. 189–192. ACM, New York, NY, USA (2010). http://doi.acm.org/10.1145/1718918.1718953

  5. Becker, H., Naaman, M., Gravano, L.: Beyond trending topics: real-world event identification on twitter (2011)

    Google Scholar 

  6. Becker, H., Naaman, M., Gravano, L.: Learning similarity metrics for event identification in social media. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, ser. WSDM ’10, pp. 291–300. ACM, New York, NY, USA (2010). http://doi.acm.org/10.1145/1718487.1718524

  7. Atefeh, F., Khreich, W.: A survey of techniques for event detection in twitter. Comput. Intell. 3(1)

    Google Scholar 

  8. Essmaeel, K., Gallo, L., Damiani, E., De Pietro, G., Dipanda, A.: Comparative evaluation of methods for filtering kinect depth data. Multimedia Tools Appl. 74(17), 7331–7354 (2015)

    Article  Google Scholar 

  9. Aramaki, E., Maskawa, S., Morita, M.: Twitter catches the flu: detecting influenza epidemics using twitter. In: Proceedings of Conference on Empirical Methods in Natural Language Processing (2011)

    Google Scholar 

  10. Lamb, A., Paul, M.J., Dredze, M., Separating fact from fear: tracking flu infections on twitter. In: HLT-NAACL, pp. 789–795 (2013)

    Google Scholar 

  11. Chon, J., Raymond, R., Wang, H., Wang, F.: Modeling flu trends with real-time geo-tagged twitter data streams. In: Wireless Algorithms, Systems, and Applications, pp. 60–69. Springer (2015)

    Google Scholar 

  12. Diaz-Aviles, E., Stewart, A.: Tracking twitter for epidemic intelligence: case study: Ehec/hus outbreak in germany, 2011. In: Proceedings of the 4th Annual ACM Web Science Conference, ser. WebSci ’12, pp. 82–85. ACM, New York, NY, USA (2012). http://doi.acm.org/10.1145/2380718.2380730

  13. Chunara, R., Andrews, J.R., Brownstein, J.S.: Social and news media enable estimation of epidemiological patterns early in the 2010 haitian cholera outbreak. Am. J. Trop. Med. Hyg. 86(1), 39–45 (2012). http://www.ajtmh.org/content/86/1/39.abstract

    Google Scholar 

  14. Gomide, J., Veloso, A., Meira, W., Almeida, V., Benevenuto, F. Ferraz, F., Teixeira, M.: Dengue surveillance based on a computational model of spatio-temporal locality of twitter. In: Proceedings of ACM WebSci’2011 (2011)

    Google Scholar 

  15. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1–15:58 (2009). http://doi.acm.org/10.1145/1541880.1541882

  16. Hobbs, J.R., Riloff, E., Information extraction. In: Indurkhya, N., Damerau, F.J. (eds.) Handbook of Natural Language Processing, Second Edition, Boca Raton. FL: CRC Press, Taylor and Francis Group (2010)

    Google Scholar 

  17. Amato, F., Mazzeo, A., Penta, A., Picariello, A.: Using NLP and ontologies for notary document management systems. In: Proceedings of the 19th International Conference on Database and Expert Systems Application (2008)

    Google Scholar 

  18. Amato, F., Casola, V., Mazzocca, N., Romano, S.: A semantic approach for fine-grain access control of e-health documents. Logic J. IGPL 21(4), 692–701 (2013)

    Article  MathSciNet  Google Scholar 

  19. Amato, F., Fasolino, A., Mazzeo, A., Moscato, V., Picariello, A., Romano, S., Tramontana, P.: Ensuring Semantic Interoperability for E-health Applications, pp. 315–320 (2011)

    Google Scholar 

  20. Riloff, E.: Automatically constructing a dictionary for information extraction tasks. In: Proceedings of the Eleventh National Conference on Artificial Intelligence (1993)

    Google Scholar 

  21. Grishman, R.: Information Extraction: Capabilities and Challenges (2012)

    Google Scholar 

  22. Pantel, P., Pennacchiotti, M.: Espresso: leveraging generic patterns for automatically harvesting semantic relations. In: Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics (2006)

    Google Scholar 

  23. Caggianese, G., Neroni, P., Gallo, L.: Natural interaction and wearable augmented reality for the enjoyment of the cultural heritage in outdoor conditions. In: Augmented and Virtual Reality, pp. 267–282. Springer (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Flora Amato .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Amato, F., Cozzolino, G., Mazzeo, A., Romano, S. (2016). Malicious Event Detecting in Twitter Communities. In: Pietro, G., Gallo, L., Howlett, R., Jain, L. (eds) Intelligent Interactive Multimedia Systems and Services 2016. Smart Innovation, Systems and Technologies, vol 55. Springer, Cham. https://doi.org/10.1007/978-3-319-39345-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39345-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39344-5

  • Online ISBN: 978-3-319-39345-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics