57
Views
3
CrossRef citations to date
0
Altmetric
Articles

Machine learning approach for identification of threat content in audio messages shared on social media

&

References

  • Johansson, F., Brynielsson, J., & Quijano, M. N. Estimating Citizen Alertness in Crises Using Social Media Monitoring and Analysis. In 2012 European Intelligence and Security Informatics Conference-2012, pp. 189–196 (2012).
  • Kandias, M., Stavrou, V., Bozovic, N., & Gritzalis, D. Proactive Insider Threat Detection Through Social Media: The YouTube Case. In Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society-2013, pp. 261–266 (2013).
  • Sykora, M. D., Jackson, T. W., OBrien, A., & Elayan, S. National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems. In 2013 European Intelligence and Security Informatics Conference-2013, pp. 172–175 (2013).
  • Patterson, J., & Gibson, A. Deep Learning: A Practitioner’s Approach, O’Reilly Media, Inc (2017).
  • Bengio, Y., Goodfellow, I. J., & Courville, A. Deep learning. Nature, 521, pp. 436–444 (2015). doi: 10.1038/nature14539
  • Ponti, M. A., Ribeiro, L. S. F., Nazare, T. S., Bui, T., & Collomosse, J. Everything You Wanted to Know about Deep Learning for Computer Vision but Were Afraid to Ask. In 30th SIBGRAPI Conference on Graphics, Patterns and Images Tutorials (SIBGRAPI-T)-2017, pp. 17–41 (2017).
  • Dong, B., & Wang, X. Comparison deep learning method to traditional methods using for network intrusion detection. In 8th IEEE International Conference on Communication Software and Networks (ICC-SN)-2016, pp. 581–585 (2016).
  • Islam, S. M. S., Rahman, S., Rahman, M. M., Dey, E. K., & Shoyaib, M. Application of deep learning to computer vision: A comprehensive study. In 5th International Conference on Informatics, Electronics and Vision (ICIEV)-2016, pp. 592–597 (2016).
  • Jain, Achin, and Vanita Jain. “Sentiment classification of twitter data belonging to renewable energy using machine learning.” Journal of Information and Optimization Sciences, 40.2, 521-533, (2019). doi: 10.1080/02522667.2019.1582873
  • Krizhevsky, A., Sutskever, I., & Hinton, G. E. ImageNet Classification with Deep Convolutional Neural Networks. Advances in Neural Information Processing Systems, 25, pp. 1097–1105 (2012).
  • Audacity. [Online] Available: https://www.audacityteam.org/
  • Speech Recognition. [Online] Available: https://cloud.google.com/speech-to-text/
  • Arora, Amandeep Singh, Linesh Raja, and Barkha Bahl. “Data Centric Security Approach: A Way to Achieve Security & Privacy in Cloud Computing.” (2018).
  • TensorFlow. [Online] Available: https://www.tensorflow.org
  • Katherine, M. K. Can Google Translate be Taught to Translate Literature? A Case for Humanists to Collaborate in the Future of Machine Translation, Translation Review, 00:1-7 (2019).
  • Jasmin, K., Rozita, A. D., Charlie, O., Fei, S., & Karen, M. A Comprehensive Keyword Analysis of Online Privacy Policies, Information Security Journal: A Global Perspective, 27:5-6, 260-275 (2018).
  • Emily, K. V., & Melissa, T. News Literacy, Social Media Behaviors, and Skepticism toward Information on Social Media, Information, Communication & Society, (2019), DOI: 10.1080/1369118X.2019.1637445

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.