Text mining in social media for security threats

5Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We discuss techniques for information extraction from texts, and present two applications that use these techniques. We focus in particular on social media texts (Twitter messages), which present challenges for the information extraction techniques because they are noisy and short. The first application is extracting the locations mentioned in Twittermessages, and the second one is detecting the location of the users based on all the tweets written by each user. The same techniques can be used for extracting other kinds of information from social media texts, with the purpose ofmonitoring the topics, events, emotions, or locations of interest to security and defence applications.

Cite

CITATION STYLE

APA

Inkpen, D. (2015). Text mining in social media for security threats. Studies in Computational Intelligence, 621, 491–517. https://doi.org/10.1007/978-3-319-26450-9_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free