{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T10:17:15Z","timestamp":1753438635766},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9579625","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T15:29:48Z","timestamp":1635953388000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Cyber-Bullying Detection Via Text Mining and Machine Learning"],"prefix":"10.1109","author":[{"given":"Chetna","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Rahul","family":"Ramakrishnan","sequence":"additional","affiliation":[]},{"given":"Ayusha","family":"Pendse","sequence":"additional","affiliation":[]},{"given":"Priya","family":"Chimurkar","sequence":"additional","affiliation":[]},{"given":"Kiran T.","family":"Talele","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"'Method to stop Cyber-Bullying before it occurs'","year":"2015","author":"prabhu trisha","key":"ref10"},{"journal-title":"&#x2018;Method and system for detecting cyberbullying&#x2019;","year":"2020","author":"bohan","key":"ref11"},{"journal-title":"&#x2018;anti-cyber bullying method&#x2019;","year":"2019","author":"pairui","key":"ref12"},{"journal-title":"&#x2018;Hate speech detection system for online media content&#x2019;","year":"2019","author":"ghulati","key":"ref13"},{"journal-title":"&#x2018;COGNITIVE RECOGNITION AND FILTERING OF CYBERBUL-LYING MESSAGES&#x2019;","year":"2020","author":"danyluk nicholas","key":"ref14"},{"journal-title":"&#x2018;Detecting sexually predatory content in an electronic communication&#x2019;","year":"2008","author":"alexander james","key":"ref15"},{"journal-title":"&#x2018;System and method of detecting offensive content sent or received on a portable electronic device&#x2019;","year":"2009","author":"etter","key":"ref16"},{"journal-title":"&#x2018;SOCIAL MEDIA TOXICITY ANALYSIS&#x2019;","year":"2020","author":"anders","key":"ref17"},{"journal-title":"'Systems and methods for analyzing emotional responses to online interactions'","year":"2019","author":"newstadt","key":"ref18"},{"journal-title":"'DEVICES AND METHODS FOR IM-PROVING WEB SAFETY AND DETERRENCE OF CYBERBULLYING'","year":"2015","author":"day","key":"ref19"},{"journal-title":"Detection of cyberbullying incidents on the instagram social network","year":"2015","author":"hosseinmardi","key":"ref4"},{"key":"ref3","article-title":"&#x2018;Detecting Cyberbullying and Aggression in Social Commentary using NLP and Machine Learning&#x2019;","author":"sahay","year":"2018","journal-title":"International Journal of Engineering Technology Science and Research (IJETSR)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100587"},{"key":"ref5","article-title":"'Cyberbullying Detection in Social Networks Using Deep Learning Based Models, A Reproducibility Study&#x2019;","author":"eckert","year":"2018","journal-title":"Deep Learning for Detecting Cyber-bullying Across Multiple Social Media Platforms' ECIR'18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899672"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.085"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918354"},{"key":"ref1","article-title":"&#x2018;Automatic Detection of Cyberbullying in Social Media Text&#x2019;","author":"hee","year":"2018","journal-title":"Plose ONE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICICOS.2017.8276369"},{"journal-title":"&#x2018;Communication monitoring system and method enabling designating a peer&#x2019;","year":"2014","author":"hodges","key":"ref20"},{"journal-title":"&#x2018;METHOD TO STOP CYBER-BULLYING BEFORE IT OCCURS&#x2019;","year":"2015","author":"prabhu","key":"ref22"},{"journal-title":"&#x2018;Cyber-Bullying Response System and Method&#x2019;","year":"2014","author":"schoebel","key":"ref21"},{"journal-title":"&#x2018;SYSTEM AND METHOD FOR IMPROVED DETECTION AND MONITORING OF ONLINE ACCOUNTS&#x2019;","year":"2017","author":"hodges","key":"ref23"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2021,7,6]]},"location":"Kharagpur, India","end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09579625.pdf?arnumber=9579625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:41Z","timestamp":1652187341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9579625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9579625","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}