51
Views
5
CrossRef citations to date
0
Altmetric
Articles

Beginning with exploring the way for rumor free social networks

, , &

References

  • Benjamin Doerr, Mahmoud Fouz, and Tobias Friedrich. “Why Ru- mors Spread Fast in Social Networks”. Communications of the ACM, 2012 - dl.acm.org.
  • Pinto, Pedro C., Patrick Thiran, and Martin Vetterli. “Locating the source of diffusion in large-scale networks.” Physical review letters 109.6, 068702, 2012.
  • M. Jamali and H. Abolhassani, “Different Aspects of Social Network Analysis,” 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI’06), Hong Kong, 2006, pp. 66-72.
  • Sandler, Mark, and S. Muthukrishnan. “Monitoring algorithms for negative feedback systems.” In Proceedings of the 19th international conference on World wide web, pp. 871-880. ACM, 2010.
  • Zhao, Zhe, Paul Resnick, and Qiaozhu Mei. “Enquiring minds: Ear- ly detection of rumors in social media from enquiry posts.” In Proceedings of the 24th International Conference on World Wide Web, pp. 1395-1405. International World Wide Web Conferences Steering Committee, 2015.
  • Jin, X., Lin, C., Luo, J. and Han, J.. A data mining-based spam de- tection system for social media networks. Proceedings of the VLDB Endowment, 4(12), pp.1458-1461, 2011.
  • Ruchi Sharma & Khyati Chopra (2020) EEG signal analysis and detec- tion of stress using classification techniques, Journal of Information and Optimization Sciences, 41:1, 229-238 doi: 10.1080/02522667.2020.1714187
  • Marios Poulos, Evagelos Kafetzopoulos, Maria Rangoussi & Fotis Georgiacodis (2005) Statistical evaluation of computational geometry and Neural network classification methods for person identification purposes via the EEG, Journal of Discrete Mathematical Sciences and Cryptography, 8:1, 27-47 doi: 10.1080/09720529.2005.10698019
  • Li, Huayi, Zhiyuan Chen, Arjun Mukherjee, Bing Liu, and Jidong Shao. “Analyzing and Detecting Opinion Spam on a Large-scale Dataset via Temporal and Spatial Patterns.” In ICWSM, pp. 634-637. 2015.
  • C. Dong and B. Zhou, “Effectively Detecting Content Spam on the Web Using Topical Diversity Measures,” 2012 IEEE/WIC/ACM In- ternational Conferences on Web Intelligence and Intelligent Agent Technology, Macau, 2012, pp. 266-273.
  • S. Jain, V. Sharma and R. Kaushal, “Towards automated real-time detection of misinformation on Twitter,” 2016 International Confer- ence on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, 2016, pp. 2015-2020.
  • Ahmad, Tameem, Shamim Ahmad, and Mohammed Jamshed. “A knowledge based Indian agriculture: With cloud ERP arrangement.” In Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on, pp. 333-340. IEEE, 2015.
  • Wazalwar, Sampada S., and Urmila Shrawankar. “Interpretation of sign language into English using NLP techniques.” Journal of Informa- tion and Optimization Sciences 38.6 (2017): 895-910. doi: 10.1080/02522667.2017.1372136
  • W. Dong, W. Zhang and C. W. Tan, “Rooting out the rumor culprit from suspects,” 2013 IEEE International Symposium on Information Theory, Istanbul, 2013, pp. 2671-2675.
  • https://www.brandwatch.com/blog/twitter-marketing-strategy-expert-tips4/18/2017
  • Singh, Tajinder, Madhu Kumari, and Shweta Mahajan. “Feature ori- ented fuzzy logic based web spam detection.” Journal of Information and Optimization Sciences 38.6 (2017): 999-1015. doi: 10.1080/02522667.2017.1372146
  • Bansal, Palak, and Tameem Ahmad , “Methods and Techniques of Intrusion Detection: A Review”, International Conference on Smart Trends for Information Technology and Computer Communications. Springer, Singapore, 2016, pp. 518-529.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.