{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T18:01:52Z","timestamp":1765994512190,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319952031"},{"type":"electronic","value":"9783319952048"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95204-8_49","type":"book-chapter","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T17:31:42Z","timestamp":1531243902000},"page":"589-599","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards the Automatic Identification and Monitoring of Radicalization Activities in Twitter"],"prefix":"10.1007","author":[{"given":"Daniel","family":"L\u00f3pez-S\u00e1ncez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jorge","family":"Revuelta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fernando","family":"de la Prieta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Juan M.","family":"Corchado","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"49_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-319-14977-6_47","volume-title":"Distributed Computing and Internet Technology","author":"S Agarwal","year":"2015","unstructured":"Agarwal, S., Sureka, A.: Using KNN and SVM based one-class classifier for detecting online radicalization on twitter. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 431\u2013442. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-14977-6_47"},{"key":"49_CR2","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-19629-9_5","volume-title":"Trends in Practical Applications of Agents, Multi-Agent Systems and Sustainability","author":"L Becerra-Bonache","year":"2015","unstructured":"Becerra-Bonache, L., Jim\u00e9nez-L\u00f3pez, M.D.: Learning, agents, and formal languages: linguistic applications of interdisciplinary fields. In: Bajo, J., et al. (eds.) Trends in Practical Applications of Agents, Multi-Agent Systems and Sustainability. AISC, vol. 372, pp. 39\u201346. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19629-9_5"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Bian, J., Topaloglu, U., Yu, F.: Towards large-scale twitter mining for drug-related adverse events. In: Proceedings of the 2012 International Workshop on Smart Health and Wellbeing, pp. 25\u201332. ACM, October 2012","DOI":"10.1145\/2389707.2389713"},{"issue":"1","key":"49_CR4","first-page":"4","volume":"1","author":"L Blaker","year":"2015","unstructured":"Blaker, L.: The Islamic State\u2019s use of online social media. Mil. Cyber Aff. 1(1), 4 (2015)","journal-title":"Mil. Cyber Aff."},{"issue":"3","key":"49_CR5","first-page":"17","volume":"6","author":"BO Durik","year":"2017","unstructured":"Durik, B.O.: Organisational metamodel for large-scale multi-agent systems: first steps towards modelling organisation dynamics. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J. 6(3), 17\u201327 (2017)","journal-title":"ADCAIJ Adv. Distrib. Comput. Artif. Intell. J."},{"issue":"2","key":"49_CR6","first-page":"5","volume":"26","author":"B Franz","year":"2015","unstructured":"Franz, B.: Popjihadism: why young European Muslims are joining the Islamic state. Med. Q. 26(2), 5\u201320 (2015)","journal-title":"Med. Q."},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Bermingham, A., Conway, M., McInerney, L., O\u2019Hare, N., Smeaton, A.F.: Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In: 2009 International Conference on Advances in Social Network Analysis and Mining. ASONAM 2009, pp. 231\u2013236. IEEE (2009)","DOI":"10.1109\/ASONAM.2009.31"},{"key":"49_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-61578-3_18","volume-title":"Trends in Cyber-Physical Multi-Agent Systems. The PAAMS Collection - 15th International Conference","author":"P Chamoso","year":"2018","unstructured":"Chamoso, P., Rivas, A., Mart\u00edn-Limorti, J.J., Rodr\u00edguez, S.: A hash based image matching algorithm for social networks. In: de la prieta, F., et al. (eds.) PAAMS 2017. AISC, vol. 619, pp. 183\u2013190. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-61578-3_18"},{"issue":"1","key":"49_CR9","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10796-010-9273-x","volume":"13","author":"M Cheong","year":"2011","unstructured":"Cheong, M., Lee, V.C.: A microblogging-based approach to terrorism informatics: exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Inf. Syst. Front. 13(1), 45\u201359 (2011)","journal-title":"Inf. Syst. Front."},{"issue":"4","key":"49_CR10","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.eswa.2013.08.003","volume":"41","author":"JAG Coria","year":"2014","unstructured":"Coria, J.A.G., Castellanos-Garz\u00f3n, J.A., Corchado, J.M.: Intelligent business processes composition based on multi-agent systems. Expert Syst. Appl. 41(4), 1189\u20131205 (2014)","journal-title":"Expert Syst. Appl."},{"key":"49_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.55612\/s-5002-023-003","volume":"23","author":"F de la Prieta","year":"2014","unstructured":"de la Prieta, F., Gil, A.B., Rodr\u00edguez-Gonz\u00e1lez, S., Corchado, J.M.: Cloud computing and multi agent system to improve learning object paradigm. IxD&A 23, 38\u201349 (2014)","journal-title":"IxD&A"},{"key":"49_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-40669-0_2","volume-title":"Progress in Artificial Intelligence","author":"F de la Prieta","year":"2013","unstructured":"de la Prieta, F., Navarro, M., Garc\u00eda, J.A., Gonz\u00e1lez, R., Rodr\u00edguez, S.: Multi-agent system for controlling a cloud computing environment. In: Correia, L., Reis, L.P., Cascalho, J. (eds.) EPIA 2013. LNCS (LNAI), vol. 8154, pp. 13\u201320. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40669-0_2"},{"key":"49_CR13","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-319-61578-3_38","volume-title":"Trends in Cyber-Physical Multi-Agent Systems. The PAAMS Collection - 15th International Conference","author":"AS Gazafroudi","year":"2018","unstructured":"Gazafroudi, A.S., Prieto-Castrillo, F., Pinto, T., Corchado, J.M.: Organization-based multi-agent system of local electricity market: bottom-up approach. In: de la Prieta, F., et al. (eds.) PAAMS 2017. AISC, vol. 619, pp. 281\u2013283. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-61578-3_38"},{"issue":"2","key":"49_CR14","first-page":"28","volume":"49","author":"A Giachanou","year":"2016","unstructured":"Giachanou, A., Crestani, F.: Like it or not: a survey of twitter sentiment analysis methods. ACM Comput. Surv. (CSUR) 49(2), 28 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"49_CR15","first-page":"55","volume":"5","author":"A Gonz\u00e1lez Briones","year":"2016","unstructured":"Gonz\u00e1lez Briones, A., Chamoso, P., Barriuso, A.L.: Review of the main security problems with multi-agent systems used in e-commerce applications. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J. 5(3), 55\u201361 (2016)","journal-title":"ADCAIJ Adv. Distrib. Comput. Artif. Intell. J."},{"key":"49_CR16","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-319-40159-1_29","volume-title":"Trends in Practical Applications of Scalable Multi-agent Systems, the PAAMS Collection","author":"DL S\u00e1nchez","year":"2016","unstructured":"S\u00e1nchez, D.L., Revuelta, J., de la Prieta, F., Gil-Gonz\u00e1lez, A.B., Dang, C.: Twitter User Clustering Based on Their Preferences and the Louvain Algorithm. In: de la Prieta, F., et al. (eds.) Trends in Practical Applications of Scalable Multi-agent Systems, the PAAMS Collection. AISC, vol. 473, pp. 349\u2013356. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40159-1_29"},{"key":"49_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-319-62410-5_15","volume-title":"Distributed Computing and Artificial Intelligence, 14th International Conference","author":"D L\u00f3pez-S\u00e1nchez","year":"2018","unstructured":"L\u00f3pez-S\u00e1nchez, D., Arrieta, A.G., Corchado, J.M.: Deep neural networks and transfer learning applied to multimedia web mining. In: Omatu, S., Rodr\u00edguez, S., Villarrubia, G., Faria, P., Sitek, P., et al. (eds.) Distributed Computing and Artificial Intelligence, 14th International Conference. AISC, vol. 620, pp. 124\u2013131. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-62410-5_15"},{"issue":"4","key":"49_CR18","doi-asserted-by":"publisher","first-page":"8239","DOI":"10.1016\/j.eswa.2008.10.003","volume":"36","author":"A Mata","year":"2009","unstructured":"Mata, A., Corchado, J.M.: Forecasting the probability of finding oil slicks using a CBR system. Expert Syst. Appl. 36(4), 8239\u20138246 (2009)","journal-title":"Expert Syst. Appl."},{"key":"49_CR19","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-60819-8_3","volume-title":"Methodologies and Intelligent Systems for Technology Enhanced Learning","author":"CG Palomino","year":"2017","unstructured":"Palomino, C.G., Nunes, C.S., Silveira, R.A., Gonz\u00e1lez, S.R., Nakayama, M.K.: Adaptive agent-based environment model to enable the teacher to create an adaptive class. In: Vittorini, P., et al. (eds.) MIS4TEL 2017. AISC, vol. 617, pp. 20\u201327. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60819-8_3"},{"key":"49_CR20","unstructured":"Pak, A., Paroubek, P.: Twitter as a corpus for sentiment analysis and opinion mining. In: LREC, vol. 10, no. 2010, May 2010"},{"issue":"1","key":"49_CR21","first-page":"23","volume":"5","author":"R Faia","year":"2016","unstructured":"Faia, R., Pinto, T., Vale, Z.: Dynamic fuzzy clustering method for decision support in electricity markets negotiation. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J. 5(1), 23 (2016)","journal-title":"ADCAIJ Adv. Distrib. Comput. Artif. Intell. J."},{"key":"49_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-39387-2_4","volume-title":"Highlights of Practical Applications of Scalable Multi-Agent Systems. The PAAMS Collection","author":"JA Rom\u00e1n","year":"2016","unstructured":"Rom\u00e1n, J.A., Rodr\u00edguez, S., de la Prieta, F.: Improving the distribution of services in MAS. In: Bajo, J., et al. (eds.) PAAMS 2016. CCIS, vol. 616, pp. 37\u201346. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39387-2_4"},{"issue":"3","key":"49_CR23","first-page":"27","volume":"1","author":"SBA Kamaruddin","year":"2012","unstructured":"Kamaruddin, S.B.A., Ghanib, N.A.M., Liong, C.Y., Jemain, A.A.: Firearm classification using neural networks on ring of firing pin impression images. ADCAIJ Adv. Distrib. Comput. Artif. Intell. J. 1(3), 27\u201334 (2012)","journal-title":"ADCAIJ Adv. Distrib. Comput. Artif. Intell. J."},{"issue":"1","key":"49_CR24","first-page":"81","volume":"13","author":"A Sanchis","year":"2015","unstructured":"Sanchis, A., Juli\u00e1n, V., Corchado, J.M., Billhardt, H., Carrascosa, C.: Improving human-agent immersion using natural interfaces and CBR. Int. J. Artif. Intell. 13(1), 81\u201393 (2015)","journal-title":"Int. J. Artif. Intell."},{"issue":"3","key":"49_CR25","first-page":"222","volume":"4","author":"DI Tapia","year":"2008","unstructured":"Tapia, D.I., De Paz, J.F., Rodr\u00edguez, S., Bajo, J., Corchado, J.M.: Multi-agent system for security control on industrial environments. Int. Trans. Syst. Sci. Appl. J. 4(3), 222\u2013226 (2008)","journal-title":"Int. Trans. Syst. Sci. Appl. J."},{"key":"49_CR26","doi-asserted-by":"crossref","unstructured":"Yang, C.C., Ng, T.D.: Terrorism and crime related weblog social network: link, content analysis and information visualization. In: 2007 IEEE Intelligence and Security Informatics, pp. 55\u201358. IEEE (2007)","DOI":"10.1109\/ISI.2007.379533"}],"container-title":["Communications in Computer and Information Science","Knowledge Management in Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95204-8_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T04:10:37Z","timestamp":1729397437000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95204-8_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319952031","9783319952048"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95204-8_49","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}