{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:54:56Z","timestamp":1743018896015,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811360510"},{"type":"electronic","value":"9789811360527"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-6052-7_23","type":"book-chapter","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T16:04:19Z","timestamp":1552320259000},"page":"262-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Suspicious Discussion on Online Forums Using Data Mining"],"prefix":"10.1007","author":[{"given":"Haroon","family":"ur Rasheed","sequence":"first","affiliation":[]},{"given":"Farhan Hassan","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Saba","family":"Bashir","sequence":"additional","affiliation":[]},{"given":"Irsa","family":"Fatima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,12]]},"reference":[{"key":"23_CR1","unstructured":"Murugesan, M.S., Devi, R.P., Deepthi, S., Lavanya, V.S., Princy, A.: Automated monitoring suspicious discussions on online forums using data mining statistical corpus based approach. Imp. J. Interdiscip. Res. 2(5) (2016)"},{"key":"23_CR2","unstructured":"Upganlawar, H., Sambhe, N.: Surveillance of suspicious discussions on online forums using text data mining. Int. J. Adv. Electron. Comput. Sci. 4(4) (2017)"},{"key":"23_CR3","unstructured":"Alami, S., Beqqali, O.E.: Detecting suspicious profiles using text analysis within social media. J. Theor. Appl. Inf. Technol. 73(3) (2015)"},{"issue":"3","key":"23_CR4","first-page":"212","volume":"2","author":"C Kaiser","year":"2012","unstructured":"Kaiser, C., Bodendorf, F.: Monitoring opinions in online forums-a case study from the sports industry. Int. J. Inf. Educ. Technol. 2(3), 212 (2012)","journal-title":"Int. J. Inf. Educ. Technol."},{"issue":"1","key":"23_CR5","first-page":"32","volume":"3","author":"J Hosseinkhani","year":"2014","unstructured":"Hosseinkhani, J., Koochakzaei, M., Keikhaee, S., Naniz, J.H.: Detecting suspicion information on the Web using crime data mining techniques. Int. J. Adv. Comput. Sci. Inf. Technol. 3(1), 32\u201341 (2014)","journal-title":"Int. J. Adv. Comput. Sci. Inf. Technol."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Yao, Z., Ze-wen, C.: Research on the construction and filter method of stop-word list in text preprocessing. In: Proceedings of 2011 IEEE Intelligent Computation Technology and Automation (ICICTA), pp. 217\u2013221, 11\u201313 (2011)","DOI":"10.1109\/ICICTA.2011.64"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Ayral, H., Yavuz, S.: An automated domain specific stop word generation method for natural language text classification. In: International Symposium on Proceedings of Innovations in Intelligent Systems and Applications (INISTA), pp. 500\u2013503, 15\u201318 June 2011","DOI":"10.1109\/INISTA.2011.5946149"},{"key":"23_CR8","unstructured":"Silva, C., Ribeiro, B.: The importance of stop word removal on recall values in text categorization. In: 2003 Proceedings of the International Joint Conference on Neural Networks, vol. 3. IEEE (2003)"},{"key":"23_CR9","unstructured":"Yu, S.: Stemming algorithm for text data and application to data mining. In: Proceedings of 2010 IEEE 5th International Conference on Computer Science & Education (ICCSE), pp. 507\u2013510, 24\u201327 (2010)"},{"issue":"3","key":"23_CR10","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"MF Porter","year":"1980","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130\u2013137 (1980)","journal-title":"Program"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"O\u2019Connor, B., Balasubramanyan, R., Routledge, B.R., Smith, N.A.: From tweets to polls: linking text sentiment to public opinion time series. In: Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media (2010)","DOI":"10.1609\/icwsm.v4i1.14031"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Ho, T.K.: Stop word location and identification for adaptive text recognition. In: Proceedings of 2000 IEEE International Journal on Document Analysis and Recognition, vol. 3, no. 1 (2000)","DOI":"10.1007\/PL00013551"},{"key":"23_CR13","unstructured":"Zeng, Z., Yang, H., Feng, T.: Data mining methods for knowledge discovery. In: Proceedings of 2011 IEEE International Conference on Data Mining Methods for Extraction of Data, pp. 412\u2013415, 29\u201331 (2011)"},{"key":"23_CR14","unstructured":"Yang, Y.: An evaluation of statistical approaches to text categorization. In: Proceedings of 1999 IEEE Journal on Information Retrieval, vol. 1, no. 1 (1999)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Li, R., Wang, S., Deng, H., Wang, R., Chang, K.C.-C.: Towards social user profiling: unified and discriminative influence model for inferring home locations. In: KDD 2012, Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, USA (2012)","DOI":"10.1145\/2339530.2339692"},{"issue":"3","key":"23_CR16","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"MF Porter","year":"1980","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130\u2013137 (1980)","journal-title":"Program"},{"key":"23_CR17","unstructured":"Marquiz, S.: Classificateur de Kolmogorov sur le web 7 Juin (2004)"},{"key":"23_CR18","unstructured":"Levorato, V., Van Le, T., Lamure, M., Bui, M.: Distance de compression et classification pr\u00e9topologique (2009)"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Kaufman L., Rousseeuw P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley Interscience (1990)","DOI":"10.1002\/9780470316801"},{"key":"23_CR20","unstructured":"Dommers, M.: Calculating the normalized compression distance between two strings, 20 January 2009"},{"issue":"3","key":"23_CR21","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Comput. Surv. 31(3), 264\u2013323 (1999)","journal-title":"ACM Comput. Surv."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.N.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (1993)","DOI":"10.1145\/170035.170072"},{"key":"23_CR23","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2009","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2009)"},{"key":"23_CR24","unstructured":"Agrawal, R., Srikant, R.: Mining sequential motifs. In: 11th International Conference on Data Engineering (1995)"},{"key":"23_CR25","unstructured":"Frank, R., Cheng, C., Pun, V.: Social media sites: new fora for criminal, communication, and investigation opportunities. Research and National Coordination Organized Crime Division Law Enforcement and Policy Branch Public Safety Canada (2011)"},{"key":"23_CR26","unstructured":"Alderson, M.: Facebook: a useful tool for police? Connectedcops. 25 January 2011. Web, 3 February 2011"},{"key":"23_CR27","unstructured":"Sentistrength - sentiment strength detection in short texts. http:\/\/sentistrength.wlv.ac.uk"},{"key":"23_CR28","unstructured":"Caren, N.: An Introduction to Text Analysis with Python. http:\/\/nealcaren.web.unc.edu\/"},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Gokulakrishnan, B., Priyanthan, P., Ragavan, T., Prasath, N., Perera, A.: Opinion mining and sentiment analysis on a Twitter data stream. In: 2012 International Conference on Advances in ICT for Emerging Regions (ICTer), pp. 182\u2013188 (2012)","DOI":"10.1109\/ICTer.2012.6423033"},{"key":"23_CR30","unstructured":"Recorded future: Creating an insightful world. https:\/\/www.recordedfuture.com\/"},{"key":"23_CR31","unstructured":"Voices of the Mumbai terror siege: Police taped chilling phone conversations between suicide terrorists and their Pakistani handlers. http:\/\/transcripts.cnn.com\/TRANSCRIPTS\/0911\/15\/fzgps.01.html"},{"key":"23_CR32","unstructured":"The Hindu: Audio of 26\/11 tape: Zabiuddin ansari briefs terrorists. http:\/\/www.thehindu.com\/news\/resources\/article3568903.ecel"},{"key":"23_CR33","unstructured":"Black Friday: The shocking truth behind the 1993 Bombay blast film conversation subtitle. http:\/\/www.subtitles.net\/en\/ppodnapisi\/podnapis\/i\/206775\/black-friday-2004-subtitlesl"},{"key":"23_CR34","unstructured":"Jurafsky, D., Bethard, S.: Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition. Pearson Education Inc. (2009)"},{"key":"23_CR35","unstructured":"Bird, S., Klein, E., Loper, E.: Natural Language Processing with Python. 1005 Gravenstein Highway North. O Reilly Media, Inc. Sebastopol (2009)"},{"issue":"6","key":"23_CR36","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41(6), 391\u2013407 (1990)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"23_CR37","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"CD Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Schutze, H.: Introduction to Information Retrieval. Cambridge University Press, New York (2008)"},{"key":"23_CR38","unstructured":"Gephi: Network analysis and visualization. https:\/\/gephi.org\/"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"Kumar, A.S., Singh, S.: Detection of user cluster with suspicious activity in online social networking sites. In: 2013 2nd International Conference on Advanced Computing, Networking and Security (ADCONS), pp. 220\u2013225. IEEE (2013)","DOI":"10.1109\/ADCONS.2013.17"},{"key":"23_CR40","unstructured":"Bavane, A.B., Ambilwade Priyanka, V., Bachhav Mourvika, D., Dafal Sumit, N., Fulari Priyanka, Y.: Monitoring suspicious discussions on online forum by data mining"}],"container-title":["Communications in Computer and Information Science","Intelligent Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-6052-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T11:37:34Z","timestamp":1694691454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-6052-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811360510","9789811360527"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-6052-7_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bahawalpur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pakistan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intap2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/jdconline.net\/intap\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}