<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The spider-man behavior protocol: exploring both public and dark social networks for fake identity detection in terrorism informatics</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Matteo Cristani</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Elisa Burato</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Katia Santaca</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Claudio Tomazzoli</string-name>
          <email>claudio.tomazzolig@univr.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Verona</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Hiding true personality behind a facade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a facade behaviour coupled with a second life consisting mainly in illegal activities and their planning. Nowadays a few cases of behaviours that hide a dangerous activity, possibly illegal, behind an apparentely neutral and mean public person, can be replicated, and sometimes just provided, by a social network prole. Recognizing that a social network pro le is fake, in some extreme cases, a bot, and determining the contour relationships that limit such a condition is one of the most important weapons for terrorism ght. In this paper we show that what we name the Spider-man protocol, a set of behaviour rules that bring to hiding a personality behind a facade, has several weaknesses, and it is prone to a set of attacks that permit to detect these behaviours. We provide the description of an experimental architecture that is used for determining violations of the protocol, and therefore breaches in the secrecy of the individual protection settled by the terrorists.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>In the recent past, it has been found that the web is also being used as a tool
by radical or extremist groups and users to practice several kinds of mischievous
acts with concealed agendas and promote ideologies in a sophisticated manner,
so that several studies have been performed on how to understand and identify
tension or deviant behaviors before these can lead to acts of terrorism. These
investigations are paired by those studies, especially in the information
security research area, that aim at determining cases of phishing, where people are
showing o themselves as individuals di erent then they are, to obtain illegal
pro ts.</p>
      <p>To the best of our knowledge, however, only a few investigations have been
carried out that combine these two aspects. It is clear that, when someone passes
the border and becomes a terrorist, there is an observable phase in which part
of her life is still public though partly hidden, whilst after this phase that
person becomes invisible. A few behaviours can be classi ed that correspond to
become clandestine for illegal purposes, and, on the other hand, there are a few
behaviours that can make such condition disclosed.</p>
      <p>
        In this paper we study the ways in which the aforementioned transition
happens (Section 4.1), how you can provide the recognition of a breach in such a
protocol (Section 4.2) and present an architecture to deal with such a recognition
need (Section 5). Before to do so, we need to model the behaviours (Section 2)
and introduce a method, that is the extension of an existing approach [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] to more
general cases (Section 3). At the end of the above presented studies, we review
the recent literature (Section 6) and nally introduce some further perspective
(Section 7).
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>How do terrorists behave on the web?</title>
      <p>The majority of radical and extremist groups do not appear as regular individuals
on the public web. They typically hide themselves under the level of publicly
mapped web sites, the so-called Deep Web. This area of the web, often also
known as invisible web is essentially identical to the visible part, aside from
the lack of association of the web addresses to the web spiders of Google and
other search engines. Within the Deep Web umbrella, many of those individuals
interact in a social network that is totally hidden to the public web, the so-called
darknets. This area of the web is known as Dark Web.</p>
      <p>There are many hidden social networks, including, in particular, the
wellknown AnonPlus secret network, or the less known but very important
DarkNetMarket, used to interact in the Dark Web by criminals, including drug
marketers, pedophiles, terrorists. The majority of these web sites need speci c tools
to be used, as, for instance Tor, Freenet or I2P, and employ speci c P2P
protocol methods, including the les used for the speci c P2P purpose, the .onion
ones. The public part of the web is also referred to, in particular by the users of
the Darknets, as the Cleranet.</p>
      <p>The notion of a terrorist used in the current literature is that he is an
individual who is acting in a public environment and secretly ghting for a social,
political, religious, ethnic, or national cause. This de nition implies that a
terrorist can be in one of the following general conditions:
{ Fully clandestine, the condition of terrorists acting completely on the secrecy,
hidden in a place where they cannot be found. This is the case, for instance,
of Al-Qaeda in certain areas, like Europe and the United States.
{ Rebel, when a ghting individual lives separately from the counterpart, in
a publicly known area, but protected by an openly ghting group. ISIS is
acting in this way.
{ Double living, when they act publicly as apparently harmless people, whilst
living a second life of active ghters for some causes. This is the way in which
Al-Qaeda members act in the same areas where fully clandestine members
also exist.</p>
    </sec>
    <sec id="sec-3">
      <title>Detecting terrorists: social media and dark web analysis</title>
      <p>The basis of the web analysis we provide is a twofold approach: we aim at tracing
individuals who act under the umbrella of the Dark Web in double living style
as de ned in Section 2. We trace individuals in the Darknets, and individuals in
the Clearnet, and use a combination of Social Network and Sentiment Analysis
for coupling pro les on the two sides.</p>
      <p>The approach is based on the idea that when it is possible to establish a
clear correspondence between an individual living a double lives style, it is also
possible to mark that individual as a potential suspect, and therefore enshorten
signi canly investigative e orts. The potential is expressed in the duality of
Darknet expression of ideas whose admissibility in public domain is deputable,
especially when those ideas have a political origin, in a very general sense,
including in this also religious, class, national and ethinc principles. The concept
is that when it is possible to decontour two individuals that are likely to coincide
in the reality, and one of these individuals have a speci c interest in political
issues, there is a suspect of terrorism (potentially).</p>
      <p>To determine an individual to correspond in the Darknets and in the
Clearnet, we use the homophily principle, namely we consider two invidiuals to be as
close as their interests are in common. On the other hand, we make use of the
so-called Social Network Analysis, considering two individuals to be as close as
their reference networks overlap.</p>
      <p>The di culty in comparing individuals belonging to the two distinct sides of
the web, is that they try to hide their correspondence, namely they try to make
almost impossible to compare them. The behaviour of individuals that aim at
avoinding any overlapping between their harmless public counterpart and their
secret dark counterpart is here referred to as the Spider-man protocol. Clearly,
if an individual is rigourous in keeping the two sides apart, and prevents any
leak of information the protocol is respected, and no one can ever discover this
secret. In Section 4, we analyse two situations in which it is possible to provide
an attack to terrorism privacy, that can be used for useful purposes. The major
weakness phase is the initial one, when an individual becomes a terrorist. Minor
cases regard the preparation of a terroristic attack, and the phase in which an
individual plays with the idea of exiting an organization.
3.1</p>
      <p>Social network analysis: the social network measures of
terrorists
A connection network of an individual i contains people that etiher have a
personal relationship with i, or have a certain group of interests in common. When
it is possible to detect the existence of interests in common (homophily), we can
establish that u shares some interest with J .</p>
      <p>Clearly, to share interest does not imply to share viewpoints, and thus an
extremist can have a high homophily with a moderate person, being both
interested in politics, and maybe being both on similar position, but still not sharing
the model of acting, as in particular, being di erent in acceptin or not acts of
violence as means for making own ideas succed.</p>
      <p>If an individual i is a terrorist and and an individual j is homophilic and
connected to i it is plausible that also j should be suspect of terrorism. Therefore,
once we know that an individual is connected to a potential terrorist, we attempt
at determining connections that can be referential for other individuals.
3.2</p>
      <sec id="sec-3-1">
        <title>Sentiment analysis: words of terrorists</title>
        <p>Every terrorist organization employs a speci c war lexicon, a sort of glossary
of the ghter. The analysis of the posts of people close to terrorists, as well as
many communications from self-declared terrorists, shows that there is
combination of extremism and speci city of the referential ideology. Communist terrorist
movements mixed up, for instance, words of war like ght, battle, kill, and many
others with words of communism as working class, revolution, proletariat
dictature, and others.</p>
        <p>The common style of terrorist communication is also the usage of secret
words, the so called code language. A famous example of this method of
communication is the use of the term pack by tupamaros terrorists in South Amrrica
in the Seventies, to refer a potential victim of a terrorist attack.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Weak passages of terrorism web behaviour</title>
      <p>There are three phases of the terrorist activities in which the Spider-man protocol
is weaker in resisting to attacks:
{ In the phase in which an internaut becomes a terrorist, or in formal terms,
enter a double lives behaviour;
{ In the near temporal proximity of a terrorist attack, epecially during the
preparation days;
{ The phase in which an individual is planning to exit the terrorist organization
he belongs to.</p>
      <p>Majorly, during these phases, it is relatively easier that the terrorist makes
errors, namely he breaches the protocol, by revealing directly or indirectly his
identity.
4.1</p>
      <sec id="sec-4-1">
        <title>The radicalisation phase</title>
        <p>The radicalization phase is the period of time in which a person starts to move
his political ideas close to those of an active terrorist group, or more generically,
to the ideas of a political area where violence is considered an option.</p>
        <p>From an use of the language viewpoint, it is relatively simpler to determine
such a change of behaviour in those contour conditions where radicals exist and
are contiguous to extremists and moderates in a general large organization. For
instance this happens for islamic terrorists, and to a more restricted extent, due
to the reduction of size of the general movement, for revolutionary communist
groups.</p>
        <p>Analogously, the social network analysis of these groups reveals that the
number of contacts of a newbie radical increase suddenly, during the radicalisation
phase. This is due to entering the organization, and is also due to the attraction
to other potential newbies generated by the appearance of the newbie in the
panorama of radicals and extremists. After a phase like that, the radical pass to
the double lives. When this happens, again relatively suddenly, the darknet side
of them appear.</p>
        <p>From a pure observational viewpoint, this is the phase in which apparent
continuity of the Clearnet user is not anymore present: they need to be partly in
the Darknets, and this absences are less justi ed than those of others, because the
Clearnet radicals, not the terrorists, obviously, miss the presence of the newbie.
In this phase, the number of posts, comments, sharing and other behaviours
decrease. Simultaneously a newbie with some omophily of the Clearnet user
appears. The radical who is moving to a terrorist group passes a phase in which
his above board personality needs to be guarded, and therefore the Clearnet
user appear often to become less aggressive, and less interested in establishing
connections with other radicals. Recognizing these behaviour treats is a viable
method to identify a potential terrorist in his initial phase.
4.2</p>
        <p>Breaching protocols: when terrorists leave permanent traces on
the web
During the preparation of a terrorist attack the members of an organization
intensiify their darknet communications. Provided that you have connected a
Clearnet personality to a hidden Darknet one, the hidden persobality can bring
you the information (in this case, regarding an attack in the near future), and
the Clearnet one can bring you to the terrorist actual life.</p>
        <p>On the other hand, when a member of a terrorist organization is about to
leave the organization itself, he tends to dissimulate his desire at most, being
this passage much more dangerous in terms of personal freedom than it can be
the opposite one, when someone enters an organization. However, a few errors
are well-known as providing a view of this cases. In particular it is well known
from military literature that moderate dissimulation that is a typical facade
of terrorist with double lives on their Clearnet personality, decreases in those
phases.</p>
        <p>The ability of recognizing the aforementioned treats completely relies upon
the combination of sentiment analysis and social network analysis. A exible
architecture for providing such a method is prsented in next section.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>An architecture for the detection of potential terrorists</title>
      <p>In this section we introduce an architecture for the detection of terrorists and
potential ones called DetectTerror.</p>
      <p>DetectTerror aim is to detect fake identity analyzing data coming from both
public and dark social networks, as summarized in Figure 1.</p>
      <p>DetectTerror is made of several modules, each one with a single responsibility;
the logic model of DetectTerror is reported in FigureDetectTerror 2.</p>
      <p>Every module is related to at leas one other, while all refer to one named
Orchestrator :
Crawler: this component aims at the retrieval of raw informations form a
speci c source (i.e. Twitter, Facebook) following information structure to gather
the correct piece of data. To add a new source to DetectTerror the only
implementation regards this module and its related Normalizer
Normalizer: this component can analyze data and format them so that they
are all in the same format and with a structure which makes them ready for
the analysis
Analyzer: this module takes as input normalized data and gives as output a
representation suitable to be later exposed to the Reasoner, a kind of digital
identity ngerprint
Reasoner: this is the actual core of DetectTerror, the one which aim is to
discover the relations between digital identities ngerprints to exploit where
connections are
Orchestrator: this module is the \main app" of DetectTerror actually
coordinating all others
Normalizer</p>
      <p>Normalizer
Analyzer</p>
      <p>Reasoner</p>
      <p>Orchestrator</p>
      <p>User Interface
Knowledge
Database
Knowledge base: where the knowledge base is stored; the Reasoner will access
it for reasoning and the Orchestrator will increment it after evaluation of the
results of the reasoner
Database: where all application data are stored, including partially evaluated
retrieved data, con gurations needed to e ectively access information on
social media, rules for data normalization, etc.</p>
      <p>User Interface: tho module provides visualization of all data, allow user to
modify parameters
6</p>
    </sec>
    <sec id="sec-6">
      <title>Related Work</title>
      <p>
        There are numerous natural language processing applications for which
subjectivity analysis is relevant, including information extraction and text
categorization. According to Wiebe [
        <xref ref-type="bibr" rid="ref21">36</xref>
        ], the subjectivity of a text is de ned as the
set of elements describing the private state of the writer (emotions, opinions,
judgments, etc.).
      </p>
      <p>
        The term Sentiment Analysis has been introduced in 2001, in order to
describe the process aimed at automatically evaluating the polarity expressed by
a set of given documents [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The term Opinion Mining has been introduced in
2003 in order to describe the activity aimed at processing a set of search results
for a given item, generating a list of product attributes and aggregating opinions
about each of them [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. While OM is mainly focused on recognizing opinions
expressed in a given text with respect a speci c attributes, SA is focused on
classifying a given document according with the polarity [23].
      </p>
      <p>
        There are several recent studies about sentiment analysis. A common
approach for SA is to select a machine-learning algorithm and a method of
extracting features from texts and then train the classi er with a human- coded
corpus. The main features in representing documents are: bag-of-words as in [
        <xref ref-type="bibr" rid="ref1 ref18 ref20">1,
17, 16, 33, 35</xref>
        ] or tree sentence parsing as in [
        <xref ref-type="bibr" rid="ref15">30, 19</xref>
        ].
      </p>
      <p>
        In [20], the authors show how the SA depends upon the adjectival and
adverbial modi cation of nouns and verbs. Adjectives and adverbs are largely studied
as word-sense modi cators in the NLP community [
        <xref ref-type="bibr" rid="ref12 ref14 ref7">28, 14, 7, 12, 21</xref>
        ].
      </p>
      <p>
        In [25] the authors show how to detect authorship by a similarity measure
among documents represented by vector space model to identify fake content
and fake users. The problem of authorship attribution is to identify the author
of a new document having a corpora of documents of known authors [
        <xref ref-type="bibr" rid="ref17">27, 32</xref>
        ]. On
the other hand, the authors of [26] present a web service that tracks the di usion
of a set of keywords to detect atrotur ng and fake content by means of social
network analysis procedures.
      </p>
      <p>
        The authors of [
        <xref ref-type="bibr" rid="ref19">34</xref>
        ] present a survey of the issues in social interaction and the
recognition of user behaviour in social channels. The analysis of social behavior
and patterns of users is the main part in the identi cation of user groups, as in
[22], and in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        Some scientist, thanks to the release in 2010 from the famous social network
Twitter of remote stream APIs that enabled performing of real-time analytics,
concentrated on extracting meaning from tweets[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        The authors in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] explored the frequency of retweets surrounding an event
and the duration between the rst and the last of these retweet to extract
information on how people behave when confronted with both positive and negative
events.
      </p>
      <p>
        Using the aforementioned Twitter API, in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] data have been used in the
study of the spread of online hate speech, or cyber hate, and forecast the likely
spread of cyber hate; a classi er was used based on Bag Of Word model and the
presence of key terms.In [29] word are tagged using TreeTagger (Schmid, 1994)
and interpreted the di erence of tag distributions between sets of text (positive,
negative, neutral or subjective, objective), while in [15] the authors make use of
ontologies to enhance sentiment analysis and attach a sentiment grade for each
distinct notion in Twitter posts.
      </p>
      <p>
        Always analyzing Twitter data, in [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] there is an attempt at understanding
tension at an early stage and evidence is given that a combination of conversation
analysis methods and text mining outperforms machine learning approaches at
such task.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref22">37</xref>
        ] the whole chapter is related to topics of sentiment analysis based
on visual and textual content, where information is extracted from meaning of
words or images.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref16">31</xref>
        ] the authors search for Negativity, Fear, and Anger showing that fear
and anger are distinct measures that capture di erent sentiments, and they
achieve these results using dictionary-based sentiment analysis.
      </p>
      <p>Mining opinions and sentiment from social networking sites is the aim in [18]
where the tool used is a bag of words feature set enhanced by a statistical
technique named Delta TFIDF to e ciently weight word scores before classi cation.</p>
      <p>
        To exploit certain types of information from reports on terrorist incidents,
the authors in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] perform syntactic and semantic analysis and uses lexicons of
various categories of terms.
      </p>
      <p>In [24] the focus is the problem of real-time sub-events identi cation in social
media data (i.e., Twitter, Flickr and YouTube) during emergencies, and the
method used involved tracking the relevant vocabulary to capture the evolution
of sub-events over time.</p>
      <p>
        There is also a study [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] in which Social Network Analysis is combined with
Sentiment Analysis to explore the potential for the possibility of individuals
being radicalised via the Internet; key terms and their frequency are used in this
analysis.
      </p>
      <p>
        As a matter of fact, it is not only what is said that counts, but also who is
speaking. There are people more likely to be listened to (or followed ) than others
and it can be of relevance to identify radically in uential users in web forums,
which the subject of other studies[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
7
      </p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions</title>
      <p>This paper describes an architecture that can be used for detecting terrorists
when they use Darknets and the Clearnet in a substantially di erent and anyhow
permeable way, breaching what we call the Spider-man behaviour protocol.</p>
      <p>There are three di erent ways in which this research has to be taken further.
First of all, we shall implement the technology in practice and experiment it
with real-life cases, in order to provide a direct and veri able example of what
suggested in this paper. Secondly we need to re ne both social and sentiment
techniques in order to detect terrorists at di erent developing stages: early stage,
namely when they enter the organization and pass to a clandestine (possibly
partly) life, phase before exiting the organization (that can be used to prevent
attacks). Finally it is of strong interest to provide a ranking, possibly regarding
belonging to an organisation as well as a form of measure for the probability of
an individual to enter an organisation.
15. Efstratios Kontopoulos, Christos Berberidisand Theologos Dergiades, and Nick
Bassiliades. Ontology-based sentiment analysis of twitter posts. Expert Systems
with Applications, 2013.
16. Zhaohui Luo. Formal semantics in modern type theories with coercive subtyping.</p>
      <p>Linguistics and Philosophy, 35(6):491{513, 2012.
17. Andrew L. Maas, Raymond E. Daly, Peter T. Pham, Dan Huang, Andrew Y. Ng,
and Christopher Potts. Learning word vectors for sentiment analysis. In
Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics:
Human Language Technologies - Volume 1, HLT '11, pages 142{150, Stroudsburg,
PA, USA, 2011. Association for Computational Linguistics.
18. Justin Martineau and Tim Finin. Delta t df: An improved feature space for
sentiment analysis. In Proceedings of the Third International ICWSM Conference,
2009.
19. Je Mitchell and Mirella Lapata. Composition in distributional models of
semantics. Cognitive Science, 34(8):1388{1439, 2010.
20. A. Moreo, M. Romero, J.L. Castro, and J.M. Zurita. Lexicon-based
commentsoriented news sentiment analyzer system. Expert Systems with Applications,
39(10):9166 { 9180, 2012.
21. Marcin Morzycki. Modi cation, 2013. Book manuscript. In preparation for the</p>
      <p>Cambridge University Press series Key Topics in Semantics and Pragmatics.
22. Arjun Mukherjee, Bing Liu, Junhui Wang, Natalie Glance, and Nitin Jindal.
Detecting group review spam. In Proceedings of the 20th International Conference
Companion on World Wide Web, WWW '11, pages 93{94, New York, NY, USA,
2011. ACM.
23. Bo Pang and Lillian Lee. Opinion mining and sentiment analysis. Found. Trends</p>
      <p>Inf. Retr., 2(1-2):1{135, January 2008.
24. Daniela Pohl, Abdelhamid Bouchachia, and Hermann Hellwagner. Online indexing
and clustering of social media data for emergency management. Neurocomputing,
2015.
25. Tieyun Qian and Bing Liu. Identifying multiple userids of the same author. In
Proceedings of the 2013 Conference on Empirical Methods in Natural Language
Processing, EMNLP 2013, 18-21 October 2013, Grand Hyatt Seattle, Seattle,
Washington, USA, A meeting of SIGDAT, a Special Interest Group of the ACL, pages
1124{1135, 2013.
26. Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Goncalves, Snehal Patil,
Alessandro Flammini, and Filippo Menczer. Truthy: Mapping the spread of
astroturf in microblog streams. In Proceedings of the 20th International Conference
Companion on World Wide Web, WWW '11, pages 249{252, New York, NY, USA,
2011. ACM.
27. Michal Rosen-Zvi, Thomas Gri ths, Mark Steyvers, and Padhraic Smyth. The
author-topic model for authors and documents. In Proceedings of the 20th
Conference on Uncertainty in Arti cial Intelligence, UAI '04, pages 487{494, Arlington,
Virginia, United States, 2004. AUAI Press.
28. Susan Rothstein. Fine-grained structure in the eventuality domain: The semantics
of predicative adjective phrases and be. Natural Language Semantics, 7(4):347{420,
1999.
29. Suprajha S, Yogitha C, Architha J Sanghvi, and Dr. H S Guruprasad. A study
on sentiment analysis using tweeter data. International Journal for Innovative
Research in Science and Technology, 1(9), 2015.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Marilisa</given-names>
            <surname>Amoia</surname>
          </string-name>
          and
          <string-name>
            <given-names>Claire</given-names>
            <surname>Gardent</surname>
          </string-name>
          .
          <article-title>Adjective based inference</article-title>
          .
          <source>In Proceedings of the Workshop KRAQ'06 on Knowledge and Reasoning for Language Processing, KRAQ '06</source>
          , pages
          <fpage>20</fpage>
          {
          <fpage>27</fpage>
          ,
          <string-name>
            <surname>Stroudsburg</surname>
          </string-name>
          , PA, USA,
          <year>2006</year>
          .
          <article-title>Association for Computational Linguistics</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>T.</given-names>
            <surname>Anwar</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Abulaish</surname>
          </string-name>
          .
          <article-title>Ranking radically in uential web forum users</article-title>
          .
          <source>Information Forensics and Security</source>
          , IEEE Transactions on,
          <volume>10</volume>
          (
          <issue>6</issue>
          ):
          <volume>1289</volume>
          {
          <fpage>1298</fpage>
          ,
          <year>June 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>A.</given-names>
            <surname>Bermingham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Conway</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>McInerney</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
          <article-title>O'Hare, and</article-title>
          <string-name>
            <given-names>A.F.</given-names>
            <surname>Smeaton</surname>
          </string-name>
          .
          <article-title>Combining social network analysis and sentiment analysis to explore the potential for online radicalisation</article-title>
          .
          <source>In Social Network Analysis and Mining</source>
          ,
          <year>2009</year>
          . ASONAM '09. International Conference on Advances in, pages
          <volume>231</volume>
          {
          <fpage>236</fpage>
          ,
          <year>July 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Pete</given-names>
            <surname>Burnap</surname>
          </string-name>
          , Omer F. Rana, Nick Avis,
          <string-name>
            <given-names>Matthew</given-names>
            <surname>Williams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>William</given-names>
            <surname>Housley</surname>
          </string-name>
          , Adam Edwards, Je rey Morgan, and Luke Sloan.
          <article-title>Detecting tension in online communities with computational twitter analysis</article-title>
          .
          <source>Technological Forecasting and Social Change</source>
          ,
          <volume>95</volume>
          (
          <issue>0</issue>
          ):
          <volume>96</volume>
          {
          <fpage>108</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Pete</given-names>
            <surname>Burnap and Matthew L. Williams</surname>
          </string-name>
          .
          <article-title>Cyber hate speech on twitter: An application of machine classi cation and statistical modeling for policy and decision making</article-title>
          .
          <source>Policy and Internet</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Pete</given-names>
            <surname>Burnap</surname>
          </string-name>
          ,
          <string-name>
            <surname>Matthew L. Williams</surname>
          </string-name>
          , Luke Sloan, Omer Rana,
          <article-title>and alt. Tweeting the terror: modelling the social media reaction to the woolwich terrorist attack</article-title>
          .
          <source>Soc. Netw. Anal. Min</source>
          .,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Stergios</given-names>
            <surname>Chatzikyriakidis</surname>
          </string-name>
          and
          <string-name>
            <given-names>Zhaohui</given-names>
            <surname>Luo</surname>
          </string-name>
          .
          <article-title>Adjectives in a modern typetheoretical setting</article-title>
          . In Glyn Morrill and
          <string-name>
            <surname>Mark-Jan</surname>
            <given-names>Nederhof</given-names>
          </string-name>
          , editors,
          <source>Formal Grammar</source>
          , volume
          <volume>8036</volume>
          of Lecture Notes in Computer Science, pages
          <volume>159</volume>
          {
          <fpage>174</fpage>
          . Springer Berlin Heidelberg,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Sumali</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Conlon</surname>
            , Alan S. Abrahams,
            <given-names>and Lakisha L.</given-names>
          </string-name>
          <string-name>
            <surname>Simmons</surname>
          </string-name>
          .
          <article-title>Terrorism information extraction from online reports</article-title>
          .
          <source>Journal of Computer Information Systems</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Sanjiv</given-names>
            <surname>Das</surname>
          </string-name>
          and
          <string-name>
            <given-names>Mike</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>Yahoo! for amazon: Sentiment parsing from small talk on the web</article-title>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>K.</given-names>
            <surname>Dave</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lawrence</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.M.</given-names>
            <surname>Pennock</surname>
          </string-name>
          .
          <article-title>Opinion extraction and semantic classi cation of product reviews</article-title>
          .
          <source>In Proceedings of the 12th International World Wide Web Conference (WWW)</source>
          , pages
          <fpage>519</fpage>
          {
          <fpage>528</fpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Amir</given-names>
            <surname>Hossein</surname>
          </string-name>
          and
          <string-name>
            <given-names>Akhavan</given-names>
            <surname>Rahnama</surname>
          </string-name>
          .
          <article-title>Real-time Sentiment Analysis of Twitter Public Stream</article-title>
          . University of Jyvskyl,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <article-title>Bj rn Jespersen and Giuseppe Primiero. Alleged assassins: Realist and constructivist semantics for modal modi cation</article-title>
          . In Logic, Language, and Computation - 9th
          <source>International Tbilisi Symposium on Logic, Language</source>
          , and Computation,
          <source>TbiLLC</source>
          <year>2011</year>
          , Kutaisi, Georgia,
          <source>September 26-30</source>
          ,
          <year>2011</year>
          , Revised Selected Papers, pages
          <volume>94</volume>
          {
          <fpage>114</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Nitin</surname>
            <given-names>Jindal</given-names>
          </string-name>
          , Bing Liu, and
          <string-name>
            <surname>Ee-Peng Lim</surname>
          </string-name>
          .
          <article-title>Finding unusual review patterns using unexpected rules</article-title>
          .
          <source>In Proceedings of the 19th ACM International Conference on Information and Knowledge Management</source>
          ,
          <source>CIKM '10</source>
          , pages
          <fpage>1549</fpage>
          {
          <fpage>1552</fpage>
          , New York, NY, USA,
          <year>2010</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>Christopher</given-names>
            <surname>Kennedy</surname>
          </string-name>
          .
          <article-title>Vagueness and grammar: the semantics of relative and absolute gradable adjectives</article-title>
          .
          <source>Linguistics and Philosophy</source>
          ,
          <volume>30</volume>
          (
          <issue>1</issue>
          ):1{
          <fpage>45</fpage>
          ,
          <year>February 2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          30. Richard Socher, Alex Perelygin, Jean Wu, Jason Chuang,
          <string-name>
            <given-names>Christopher D.</given-names>
            <surname>Manning</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Andrew</given-names>
            <surname>Ng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Christopher</given-names>
            <surname>Potts</surname>
          </string-name>
          .
          <article-title>Recursive deep models for semantic compositionality over a sentiment treebank</article-title>
          .
          <source>In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing</source>
          , pages
          <volume>1631</volume>
          {
          <fpage>1642</fpage>
          , Seattle, Washington, USA,
          <year>October 2013</year>
          .
          <article-title>Association for Computational Linguistics</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          31. Stuart Soroka, LorI Young, and MeItal Balmas.
          <article-title>Bad news or mad news? sentiment scoring of negativity, fear, and anger in news content</article-title>
          .
          <source>Annals of the American Academy of Political and Social Science</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          32.
          <string-name>
            <given-names>Efstathios</given-names>
            <surname>Stamatatos</surname>
          </string-name>
          .
          <article-title>A survey of modern authorship attribution methods</article-title>
          .
          <source>J. Am. Soc. Inf. Sci. Technol</source>
          .,
          <volume>60</volume>
          (
          <issue>3</issue>
          ):
          <volume>538</volume>
          {
          <fpage>556</fpage>
          ,
          <string-name>
            <surname>March</surname>
          </string-name>
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          33.
          <string-name>
            <surname>Mike</surname>
            <given-names>Thelwall</given-names>
          </string-name>
          , Kevan Buckley, and
          <string-name>
            <given-names>Georgios</given-names>
            <surname>Paltoglou</surname>
          </string-name>
          .
          <article-title>Sentiment strength detection for the social web</article-title>
          .
          <source>Journal of the American Society for Information Science and Technology</source>
          ,
          <volume>63</volume>
          (
          <issue>1</issue>
          ):
          <volume>163</volume>
          {
          <fpage>173</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          34.
          <string-name>
            <surname>David</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Uthus</surname>
            and
            <given-names>David W.</given-names>
          </string-name>
          <string-name>
            <surname>Aha</surname>
          </string-name>
          .
          <article-title>Multiparticipant chat analysis: A survey</article-title>
          .
          <source>Arti cial Intelligence</source>
          ,
          <volume>199</volume>
          ?
          <issue>200</issue>
          (
          <issue>0</issue>
          ):
          <volume>106</volume>
          {
          <fpage>121</fpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          35.
          <string-name>
            <surname>Anil Saroliya Vijay Dixit</surname>
          </string-name>
          .
          <article-title>A semantic vector space model approach for sentiment analysis</article-title>
          .
          <source>International Journal of Advanced Research in Computer and Communication Engineering</source>
          ,
          <volume>2</volume>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          36.
          <string-name>
            <surname>Janyce</surname>
            <given-names>Wiebe</given-names>
          </string-name>
          , Theresa Wilson, Rebecca Bruce, Matthew Bell, and
          <string-name>
            <given-names>Melanie</given-names>
            <surname>Martin</surname>
          </string-name>
          .
          <article-title>Learning subjective language</article-title>
          .
          <source>Comput. Linguist.</source>
          ,
          <volume>30</volume>
          (
          <issue>3</issue>
          ):
          <volume>277</volume>
          {
          <fpage>308</fpage>
          ,
          <year>September 2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          37.
          <string-name>
            <surname>Jianbo</surname>
            <given-names>Yuan</given-names>
          </string-name>
          , Quanzeng You, and
          <string-name>
            <given-names>Jiebo</given-names>
            <surname>Luo</surname>
          </string-name>
          .
          <article-title>Sentiment analysis using social multimedia</article-title>
          . In Aaron K. Baughman,
          <string-name>
            <given-names>Jiang</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <surname>Jia-Yu Pan</surname>
          </string-name>
          , and Valery A. Petrushin, editors,
          <source>Multimedia Data Mining and Analytics</source>
          , pages
          <volume>31</volume>
          {
          <fpage>59</fpage>
          . Springer International Publishing,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>