{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:04:54Z","timestamp":1775289894112,"version":"3.50.1"},"reference-count":56,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/nca.2018.8548321","type":"proceedings-article","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T18:47:51Z","timestamp":1543517271000},"page":"1-10","source":"Crossref","is-referenced-by-count":9,"title":["Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Tundis","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Bhatia","sequence":"additional","affiliation":[]},{"given":"Archit","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Max","family":"Muhlhauser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"2474","article-title":"Sentiment analysis of chinese documents: From sentence to document level","volume":"60","author":"zhang","year":"2009","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2014.05.001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229812"},{"key":"ref32","author":"omer","year":"2015","journal-title":"Using machine learning to identify jihadist messages on twitter"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2016.0216"},{"key":"ref30","author":"magdy","year":"2015","journal-title":"# FailedRevolutions Using Twitter to study the antecedents of ISIS support"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CDAN.2016.7570949"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515610513"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-5906"},{"key":"ref34","author":"ali","year":"2016","journal-title":"Identifying terrorist affiliations through social network analysis using data mining techniques"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.10.015"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1177\/0022427810391535"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.09.029"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/17539153.2012.725979"},{"key":"ref1","first-page":"45","article-title":"Terror on facebook, twitter, and youtube","volume":"16","author":"weimann","year":"2010","journal-title":"Brown Journal of World Affairs"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12117-013-9194-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2011.ap09546"},{"key":"ref21","author":"gonzales","year":"2005","journal-title":"Mapping Crime Understanding Hot Spots"},{"key":"ref24","first-page":"231","article-title":"Automatic crime prediction using events extracted from twitter posts","volume":"12","author":"wang","year":"2012","journal-title":"SBP"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984048"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.96"},{"key":"ref25","first-page":"876","article-title":"Gang presence in social network sites","volume":"5","author":"decary-h\u00e9tu","year":"2011","journal-title":"International Journal of Cyber Criminology"},{"key":"ref50","first-page":"12","article-title":"Language-independent twitter sentiment analysis","author":"narr","year":"2012","journal-title":"Knowledge Discovery and Machine Learning (KDML) LWA"},{"key":"ref51","article-title":"U.S. Department of homeland security","year":"0","journal-title":"Media monitoring"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2757401.2757408"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIET.2014.43"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICTA.2017.8090966"},{"key":"ref52","article-title":"A systems approach to cyber security","author":"abhik","year":"2017","journal-title":"Proceedings of the 2nd Singapore Cyber Security RD Conference on Digital Government Research"},{"key":"ref10","first-page":"429","article-title":"Challenges and available solutions against organized cyber-crime and terrorist networks","volume":"174","author":"tundis","year":"2018","journal-title":"WIT Transactions on The Built Environment"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12428"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/0165551515598926"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2015.1132401"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167794"},{"key":"ref14","article-title":"From illegal markets to legitimate businesses: the portfolio of organised crime in europe","author":"savona","year":"0","journal-title":"Final Report of EU co-funded Project OCP Organised Crime Portfolio 2015"},{"key":"ref15","year":"2018","journal-title":"TAKEDOWN EU H2020 Research Project"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2017.40"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICECTE.2016.7879589"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s12134-009-0109-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2202\/1944-2866.1071"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.62915\/2154-8935.1023","article-title":"Dancing with wolves: Today's lone wolf terrorists","volume":"4","author":"bates","year":"2012","journal-title":"The Journal of Public and Professional Sociology"},{"key":"ref3","author":"yayla","year":"0","journal-title":"Telegram the mighty application that isis loves"},{"key":"ref6","article-title":"The use of models in the study of organized crime","author":"von lampe","year":"2003","journal-title":"Proceedings of the 2003 Conference of the European Consortium for Political Research (ECPR)"},{"key":"ref5","author":"bjelopera","year":"2012","journal-title":"Organized crme An evolving challenge for us law enforcement"},{"key":"ref8","author":"smith","year":"2016","journal-title":"How drug cartels operate like silicon valley startups"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.4324\/9781315254241","author":"masciandaro","year":"2017","journal-title":"Global financial crime terrorism money laundering and offshore centres"},{"key":"ref49","article-title":"Language-independent bayesian sentiment mining of twitter","author":"davies","year":"2011","journal-title":"The 5th SNA-KDD Workshop11 (SNA-KDD11)"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.5120\/ijca2017913413","article-title":"A novel idea for credit card fraud detection using decision tree","volume":"161","author":"save","year":"2017","journal-title":"International Journal of Computer Applications"},{"key":"ref46","first-page":"19","article-title":"Machine translation for multilingual summary content evaluation","author":"steinberger","year":"2012","journal-title":"Proceedings of Workshop on Evaluation Metrics and System Comparison for Automatic Summarization"},{"key":"ref45","article-title":"A fall-back strategy for sentiment analysis in hindi: a case study","author":"joshi","year":"2010","journal-title":"Proceedings of the 8th ICON"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2013.03.004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2013.03.002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.164"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23126"},{"key":"ref44","first-page":"272","article-title":"Linguistic sentiment features for newspaper opinion mining","author":"scholz","year":"2013","journal-title":"International Conference on Application of Natural Language to Information Systems"},{"key":"ref43","first-page":"19","article-title":"Further experiments in sentiment analysis of french movie reviews","author":"ghorbel","year":"2011","journal-title":"Advances in Web Intelligence"}],"event":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","location":"Cambridge, MA","start":{"date-parts":[[2018,11,1]]},"end":{"date-parts":[[2018,11,3]]}},"container-title":["2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8533540\/8548052\/08548321.pdf?arnumber=8548321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T07:24:59Z","timestamp":1775287499000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8548321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/nca.2018.8548321","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}