Abstract is missing.
- A Scalable System for Bundling Online Social Network Mining ResearchLuk Burchard, Daniel Thilo Schroeder, Konstantin Pogorelov, Sören Becker, Emily Dietrich, Petra Filkukova, Johannes Langguth. 1-6 [doi]
- Capacity Management Protocol for a Structured P2P-based Online Social NetworkNewton Masinde, Sebastian Bischoff, Kalman Graffi. 1-8 [doi]
- Data Driven Network Monitoring and Intrusion Detection using Machine LearningBrandon Williams, Xishuang Dong, Lijun Qian. 1-7 [doi]
- Fane-KG: A Semantic Knowledge Graph for Context-Based Fake News Detection on Social MediaAnoud Bani-Hani, Oluwasegun A. Adedugbe, Feras N. Al-Obeidat, Elhadj Benkhelifa, Munir Majdalawieh. 1-6 [doi]
- Towards a Concurrence Analysis in Business ProcessesAnastasija Nikiforova, Janis Bicevskis, Girts Karnitis. 1-6 [doi]
- Using Social Media to Understand City-wide Movement Patterns and BehavioursGeoff Cunliffe, Chao Liang, Richard O. Sinnott. 1-8 [doi]
- Study the Impact of COVID-19 on Twitter Users with respect to Social IsolationSimranpreet Kaur, Pallavi Kaul, Pooya Moradian Zadeh. 1-6 [doi]
- Drug Reaction Discriminator within Encoder-Decoder Neural Network Model: COVID-19 Pandemic Case StudyHanane Grissette, El Habib Nfaoui. 1-7 [doi]
- Sentiment Analysis using Word2vec-CNN-BiLSTM ClassificationWang Yue, Lei Li. 1-5 [doi]
- A new approach for the detection and analysis of phishing in social networks: the case of TwitterKamel Ahsene Djaballah, Kamel Boukhalfa, Zakaria Ghalem, Oussama Boukerma. 1-8 [doi]
- Resource Efficient Algorithms for Message Sampling in Online Social NetworksLuk Burchard, Daniel Thilo Schroeder, Sören Becker, Johannes Langguth. 1-8 [doi]
- Mining Digital User TracesDenis Helic. 1 [doi]
- Mixed Methods Approach: Reconstructing Local Identities in Context of Local ReferendaAndré Schmale, Volker Mittendorf, Fabian Schmidt. 1-8 [doi]
- Experimenting with Latent Semantic Analysis and Latent Dirichlet Allocation on Automated Essay GradingJalaa Hoblos. 1-7 [doi]
- Information propagation in an era of Infodemics: The role of language contentMona Diab. 1 [doi]
- A Self-calibration of a stationary camera in the case of variable intrinsic parametersMounir El Maghraoui, Ismail El batteoui, Abderrahim Saaidi, Khalid Satori. 1-8 [doi]
- Computational evaluation of profitability: A case of Australian banksReza Roky, Malcolm Abbott, Omar Bashar, Azmat Ullah, Fahad Algarni. 1-8 [doi]
- Part-Of-Speech Tagging in French: State-of-the-Art and ObstaclesEdouard Ngor Sarr, Ousmane Sall, Lamine Faty. 1-6 [doi]
- Huntalent: A candidates recommendation system for automatic recruitment via LinkedInShayma Boukari, Sondes Fayech, Rim Faiz. 1-7 [doi]
- Existence of Twitter Users with Untraceable Retweet Paths and its ImplicationsShigeo Shioda, Keisuke Nakajima. 1-8 [doi]
- Validating Sentiment Analysis on Opinion Mining Using Self-reported Attitude ScoresJieyu Ding Featherstone, George A. Barnett. 1-4 [doi]
- A convolutional neural network-based reviews classification method for explainable recommendationsHafed Zarzour, Bashar Al-Shboul, Mahmoud Al-Ayyoub, Yaser Jararweh. 1-5 [doi]
- Users and Bots behaviour analysis in Blockchain Social MediaBarbara Guidi, Andrea Michienzi. 1-8 [doi]
- Sensitivity of Arabic Sentiment Analysis ToolsBrian Conlon, Paul Brenner. 1-6 [doi]
- An Empirical Study on Patent Novelty Detection: A Novel Approach Using Machine Learning and Natural Language ProcessingRenukswamy Chikkamath, Markus Endres, Lavanya Bayyapu, Christoph Hewel. 1-7 [doi]
- A Case Study in Twitter Bot Identification: Are They Still a Problem?Tiange Wang, Fengkai Wu, Richard O. Sinnott. 1-8 [doi]
- Community Detection for Mobile Money Fraud DetectionSafa El Ayeb, Baptiste Hemery, Fabrice Jeanne, Estelle Cherrier. 1-6 [doi]
- Towards Process Mining Utilization in Insider Threat Detection from Audit LogsMartin Macak, Ivan Vanat, Michal Merjavy, Tomás Jevocin, Barbora Buhnova. 1-6 [doi]
- Multimedia Convergence for Citizens' Well-BeingAbdulmotaleb El-Saddik. 1 [doi]
- Decentralization: A Confluence of Data and Digital PersonalityReza Shokri Kalan. 1-5 [doi]
- Effects of Reputation Systems and Group Decision Making Systems Usage on Online Social NetworksGulsum Akkuzu Kaya, Abdul Badwan. 1-7 [doi]
- Evaluating Performance Maintenance and Deterioration Over Time of Machine Learning-based Malware Detection Models on the EMBER PE DatasetColin Galen, Robert Steele. 1-7 [doi]
- Semantic Convolutional Neural Network model for Safe Business Investment by Using BERTMaryam Heidari, Setareh Rafatirad. 1-6 [doi]
- Survey paper: Taxonomy of website anti-phishing solutionsRania Zaimi, Mohamed Hafidi, Mahnane Lamia. 1-8 [doi]
- Homophily and Transitivity in Bot Disinformation NetworksEvan M. Williams, Valerie Novak, Dylan Blackwell, Paul Platzman, Ian McCulloh, Nolan Edward Phillips. 1-7 [doi]
- Direct Candidates in NRW, Social Structure and Social Network AnalysisAndré Schmale, Volker Mittendorf. 1-8 [doi]
- Understanding Reactions to Natural Disasters: a Text Mining Approach to Analyze Social Media ContentS. Zahra Razavi, Mohammad Rahbari. 1-7 [doi]
- Graph Model Proposals for Capturing Meta-information Within Professional Network DataCailin Constantinov, Dorian Dogaru, Mihai Mocanu. 1-8 [doi]
- Cone-KG: A Semantic Knowledge Graph with News Content and Social Context for Studying Covid-19 News Articles on Social MediaFeras N. Al-Obeidat, Oluwasegun A. Adedugbe, Anoud Bani-Hani, Elhadj Benkhelifa, Munir Majdalawieh. 1-7 [doi]
- Machine Translation Evaluation using Textual Entailment for ArabicMohamed El Marouani, Tarik Boudaa, Nourddine Enneya. 1-5 [doi]
- CrowdAbout: Using Vehicles as Sensors to Improve Map Data for ITSChristian Roth, Ngoc-Thanh Dinh, Dogan Kesdogan. 1-8 [doi]
- Mining Emotions on Plutchik's WheelAbhijit Mondal, Swapna S. Gokhale. 1-6 [doi]
- User Flagging for Posts at 3DTube.org: the First Social Platform for 3D-Exclusive ContentsJacob Honer, Aiden Fadool, Juyang Weng. 1-6 [doi]
- OpinionScraper: A News Comments Extraction Tool for Opinion MiningLamine Faty, Marie Ndiaye, Edouard Ngor Sarr, Ousmane Sall. 1-5 [doi]