{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:52:49Z","timestamp":1730213569044,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899443","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Big Social Data - Predicting Users' Interests from their Social Networking Activities"],"prefix":"10.1109","author":[{"given":"Alexiei","family":"Dingli","sequence":"first","affiliation":[]},{"given":"Bernhardt","family":"Engerer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6170-8_353"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/138859.138867"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/421425"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963775"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.10.015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/0539018403042001798"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3233\/SW-140134"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2481492.2481495"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376746"},{"key":"ref19","first-page":"25","article-title":"langid. py: An off-the-shelf language identification tool","author":"lui","year":"0","journal-title":"Proceedings of the ACL 2012 System Demonstrations"},{"journal-title":"Facebook for dummies","year":"2018","author":"abram","key":"ref4"},{"year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1126\/science.1167742","article-title":"Computational Social Science","volume":"323","author":"lazer","year":"2009","journal-title":"Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2645710.2645765"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380722"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","first-page":"99","article-title":"User interests identification on Twitter using a hierarchical knowledge base","volume":"8465 lncs","author":"kapanipathi","year":"2014","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref20","first-page":"69","article-title":"A Support Platform for Event Detection using Social Intelligence","author":"baldwin","year":"2012","journal-title":"EACL 2012"},{"key":"ref22","article-title":"NLTK: The Natural Language Toolkit","author":"loper","year":"0","journal-title":"Proceedings of the ACL Workshop on Effective Tools and Methodologies for Teaching Natural Language Processing and Computational Linguistics"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/016555159201800106"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, United Kingdom","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899443.pdf?arnumber=8899443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:55:34Z","timestamp":1658080534000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899443","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}