Harvesting with SONAR: the value of aggregating social network information

I Guy, M Jacovi, E Shahar, N Meshulam… - Proceedings of the …, 2008 - dl.acm.org
Web 2.0 gives people a substantial role in content and metadata creation. New
interpersonal connections are formed and existing connections become evident through …

Mining criminal networks from unstructured text documents

R Al-Zaidy, BCM Fung, AM Youssef, F Fortin - Digital Investigation, 2012 - Elsevier
Digital data collected for forensics analysis often contain valuable information about the
suspects' social networks. However, most collected records are in the form of unstructured …

[图书][B] Python for graph and network analysis

MZ Al-Taie, S Kadry - 2017 - Springer
The fast developments in the Web and Internet in the last decade and the advancements in
computing and communication have drawn people in innovative ways. Huge participatory …

Information retrieval on social network: An adaptive proof

M Elveny, R Syah, M Elfida… - IOP Conference Series …, 2018 - iopscience.iop.org
Abstract Information Retrieval has become one of the areas for studying to get the trusty
information, with which the recall and precision become the measurement form that …

[PDF][PDF] Criminal network mining by web structure and content mining

J Hosseinkhani, S Chaprut… - 11th WSEAS International …, 2012 - academia.edu
Criminal web data provide unknown and valuable information for Law enforcement
agencies continuously. The digital data which is applied in forensics analysis includes …

[PDF][PDF] Data mining based social network analysis from online behavior

J Srivastava, MA Ahmad, N Pathak… - Tutorial at the 8th SIAM …, 2008 - academia.edu
–Networks evolve because of local processes–Addition of new nodes, new links or rewiring
of old links–Preferential attachment is used for link changes–The relative frequency of these …

Towards discovering criminal communities from textual data

R Al-Zaidy, BCM Fung, AM Youssef - … of the 2011 ACM Symposium on …, 2011 - dl.acm.org
In many criminal cases, forensically collected data contain valuable information about a
suspect's social networks. An investigator often has to manually extract information from the …

Public vs. private: comparing public social network information with email

I Guy, M Jacovi, N Meshulam, I Ronen… - Proceedings of the 2008 …, 2008 - dl.acm.org
The goal of this research is to facilitate the design of systems which will mine and use
sociocentric social networks without infringing privacy. We describe an extensive experiment …

Constructing a cloud computing based social networks data warehousing and analyzing system

IH Ting, CH Lin, CS Wang - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
The research area of Social networks analysis has been recognized as extremely time-
consuming tasks as well as large storage space is always necessary in order to store the …

Parallelizing the extraction of fresh information from online social networks

R Guo, H Wang, M Chen, J Li, H Gao - Future Generation Computer …, 2016 - Elsevier
Online social networks (OSNs) are among the hottest new services in recent years. OSNs
maintain records of the lives of users, thereby providing potential resources for journalists …