Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many open sources. In this paper, we present a method to find abnormal behavior on the internet and give an early warning for threats. The system was tested on Twitter data. The results show that it can successfully analyze the content of messages and recognize abnormal changes in sentiment and threatening content
The use of Internet-based sources of information for health surveillance applications has increased ...
The popularity of online social networks has created massive social communication among their users ...
This paper proposes a new approach to determine potential criminals by performing content analysis o...
Many threats in the real world can be related to activity of persons on the internet. Internet surve...
Abstract-Many threats in the real world can be related to activities in open sources on the internet...
In recent years, the increasing number of cyber-attacks has gained the development of innovative too...
In recent years, online social media information has been the subject of study in several data scien...
Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furth...
Global malware campaigns and large-scale data breaches show how everyday life can be impacted when t...
Twitter is very popular social networking site used by billions of people to share the information w...
Although there is voluminous data flow in social media, it is still possible to create an effective ...
In today’s world social networks have become a platform to express opinions or feelings related to c...
How can Twitter be exploited to fulfill information needs of users on Twitter during incidents? In t...
In these times of increasing cybersecurity threats, monitoring and analysing cybersecurity events in...
Copyright © 2021 by SCITEPRESS – Science and Technology Publications, Lda. All rights reservedCybers...
The use of Internet-based sources of information for health surveillance applications has increased ...
The popularity of online social networks has created massive social communication among their users ...
This paper proposes a new approach to determine potential criminals by performing content analysis o...
Many threats in the real world can be related to activity of persons on the internet. Internet surve...
Abstract-Many threats in the real world can be related to activities in open sources on the internet...
In recent years, the increasing number of cyber-attacks has gained the development of innovative too...
In recent years, online social media information has been the subject of study in several data scien...
Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furth...
Global malware campaigns and large-scale data breaches show how everyday life can be impacted when t...
Twitter is very popular social networking site used by billions of people to share the information w...
Although there is voluminous data flow in social media, it is still possible to create an effective ...
In today’s world social networks have become a platform to express opinions or feelings related to c...
How can Twitter be exploited to fulfill information needs of users on Twitter during incidents? In t...
In these times of increasing cybersecurity threats, monitoring and analysing cybersecurity events in...
Copyright © 2021 by SCITEPRESS – Science and Technology Publications, Lda. All rights reservedCybers...
The use of Internet-based sources of information for health surveillance applications has increased ...
The popularity of online social networks has created massive social communication among their users ...
This paper proposes a new approach to determine potential criminals by performing content analysis o...