{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:53Z","timestamp":1740099173654,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030010805"},{"type":"electronic","value":"9783030010812"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01081-2_15","type":"book-chapter","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T15:35:32Z","timestamp":1539012932000},"page":"219-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Dynamic Detection of Radical Profiles in Social Networks Using Image Feature Descriptors and a Case-Based Reasoning Methodology"],"prefix":"10.1007","author":[{"given":"Daniel","family":"L\u00f3pez-S\u00e1nchez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Juan M.","family":"Corchado","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ang\u00e9lica","family":"Gonz\u00e1lez Arrieta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,10,9]]},"reference":[{"key":"15_CR1","unstructured":"Basic Concepts of the Homography Explained with Code. https:\/\/docs.opencv.org\/3.4.1\/d9\/dab\/tutorial_homography.html . Accessed 27 Apr 2018"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-319-14977-6_47","volume-title":"Distributed Computing and Internet Technology","author":"S Agarwal","year":"2015","unstructured":"Agarwal, S., Sureka, A.: Using KNN and SVM based one-class classifier for detecting online radicalization on Twitter. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 431\u2013442. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-14977-6_47"},{"key":"15_CR3","unstructured":"Alcantarilla, P.F., Solutions, T.: Fast explicit diffusion for accelerated features in nonlinear scale spaces. IEEE Trans. Pattern Anal. Mach. Intell. 34(7), 1281\u20131298 (2011)"},{"issue":"1","key":"15_CR4","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.dss.2012.12.034","volume":"55","author":"K Amailef","year":"2013","unstructured":"Amailef, K., Jie, L.: Ontology-supported case-based reasoning approach for intelligent m-government emergency response services. Decis. Support Syst. 55(1), 79\u201397 (2013)","journal-title":"Decis. Support Syst."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Arandjelovi\u0107, R., Zisserman, A.: Three things everyone should know to improve object retrieval. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2911\u20132918. IEEE (2012)","DOI":"10.1109\/CVPR.2012.6248018"},{"key":"15_CR6","unstructured":"Berger, J.M.: The ISIS Twitter census: making sense of ISIS\u2019s use of Twitter. The Brookings Institution (2015)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Bermingham, A., Conway, M., McInerney, L., O\u2019Hare, N., Smeaton, A.F.: Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In: International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009, pp. 231\u2013236. IEEE (2009)","DOI":"10.1109\/ASONAM.2009.31"},{"issue":"1","key":"15_CR8","first-page":"4","volume":"1","author":"L Blaker","year":"2015","unstructured":"Blaker, L.: The Islamic state\u2019s use of online social media. Mil. Cyber Affairs 1(1), 4 (2015)","journal-title":"Mil. Cyber Affairs"},{"issue":"2","key":"15_CR9","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"issue":"1","key":"15_CR10","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2001","unstructured":"McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: homophily in social networks. Ann. Rev. Soc. 27(1), 415\u2013444 (2001)","journal-title":"Ann. Rev. Soc."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Rublee, E., Rabaud, V., Konolige, K., Bradski, G.: ORB: an efficient alternative to sift or surf. In: 2011 IEEE International Conference on Computer Vision (ICCV), pp. 2564\u20132571. IEEE (2011)","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-319-40159-1_29","volume-title":"Advances in Intelligent Systems and Computing","author":"Daniel L\u00f3pez S\u00e1nchez","year":"2016","unstructured":"S\u00e1nchez, D.L., Revuelta, J., De la Prieta, F., Gil-Gonz\u00e1lez, A.B., Dang, C.: Twitter user clustering based on their preferences and the louvain algorithm. In: Trends in Practical Applications of Scalable Multi-Agent Systems, the PAAMS Collection. AISC, vol. 473, pp. 349\u2013356. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40159-1_29"},{"key":"15_CR13","series-title":"Understanding Complex Systems","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-319-43639-5_7","volume-title":"Cyberemotions","author":"M Thelwall","year":"2017","unstructured":"Thelwall, M.: The heart and soul of the web? Sentiment strength detection in the social web with sentistrength. In: Ho\u0142yst, J.A. (ed.) Cyberemotions. UCS, pp. 119\u2013134. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-43639-5_7"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Tominaga, T., Hijikata, Y.: Exploring the relationship between user activities and profile images on twitter through machine learning techniques. J. Web Sci. 3(1) (2017)","DOI":"10.1561\/106.00000015"},{"key":"15_CR15","unstructured":"Weaver, R., Silverman, B.G., Shin, H., Dubois, R.: Modeling and simulating terrorist decision-making: a \u2018performance moderator function\u2019 approach to generating virtual opponents. Center for Human Modeling and Simulation, p. 22 (2001)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Wei, X., Stillwell, D.: How smart does your profile image look? Estimating intelligence from social network profile images. In: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pp. 33\u201340. ACM (2017)","DOI":"10.1145\/3018661.3018663"},{"key":"15_CR17","unstructured":"Zhong, H., et al.: Content-driven detection of cyberbullying on the instagram social network. In: IJCAI, pp. 3952\u20133958 (2016)"}],"container-title":["Lecture Notes in Computer Science","Case-Based Reasoning Research and Development"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01081-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T18:15:09Z","timestamp":1572027309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01081-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030010805","9783030010812"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01081-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Case-Based Reasoning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccbr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccbr18.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}