1. |
A. Basu, “Social Network Analysis: A Methodology for Studying Terrorism,”Intelligent Systems Reference Library, Vol. 65, pp. 215-242, 2014
|
2. |
Q. J.Liu and J. C. Fang, “The New Development of Terrorism and Its Impact on China,”International Problem Study, Vol. 4, pp. 114-126, 2015
|
3. |
Y. T. Gong, “The Analysis of the New Dynamics of Terrorist Attacks along the Belt and Road,”Party Policy Study, Vol. 2, pp. 18-26, 2016
|
4. |
X. L.Zhang and E. Zhang, “The Risk of Terrorist Attacks and Chinese Countermeasure for the Initiative of the Belt and Road,”International Trade, Vol. 3, pp. 27-32, 2016
|
5. |
J. Falkheimer and E. Olsson, “Depoliticizing Terror: The News Framing of the Terrorist Attacks in Norway, 22 July2011,” Media,War and Conflict, Vol. 8, pp. 70-85, 2015
|
6. |
H. Zhang and D. Y. Sun, “Study on the Terrorist Cover Networks from the Perspective of Social Network Analysis,”Journal of Safety and Environment, Vol. 3, pp. 259-264, 2011
|
7. |
M. Figueres-Esteban, P. Hughes,C. V. Gulijk, “Visual Analytics for Text-based Railway Incident Reports,”Safety Science, Vol. 89, pp. 72-76, 2016
|
8. |
H. Lida, J. G. Chen, H. Y. Yuan,Y. Wang, “Terrorist Attack Vulnerability Analysis of a Natural Gas Network based on the Attacker - Defender Game Model,”Tsinghua Science and Technology, Vol. 6, pp. 609-613, 2017
|
9. |
N. Ruigrok and W. V. Atteveldt, “Global Angling with a Local Angle: How U.S., British, and Dutch Newspapers Frame Global and Local Terrorist Attacks,” The International Journal of Press/Politics, Vol. 1, pp. 68-90, 2007
|
10. |
Z. C. Wang, N. Wang,Y. Wang, “Research of Title Party News Identification Technology based on Topic Sentence Similarity,”New Technology of Library and Information Service, Vol. 11, pp. 48-53, 2011
|
11. |
L. Xin, R. Gao,L. Song, “Internet News Headlines Classification Method based on the N-Gram Language Model,” inProceedings of International Conference on Computer Science and Information Processing, pp. 826-828, 2012
|
12. |
B. Han, P. Cook,T. Baldwin, “Lexical Normalization for Social Media Text,”ACM Transactions on Intelligent Systems and Technology, Vol. 1, pp. 1-27, 2013
|
13. |
B. Erik, N. Hasher,A. Rana, “The Effect of Terrorist Events on Media Portrayals of Islam and Muslims: Evidence from New York Times Headlines, 1985-2013,”Ethnic and Racial Studies, Vol. 9, pp. 1-19, 2015
|
14. |
T. Einar and J. Daniel, “Seven Characteristics Defining Online News Formats,”Digital Journalism, Vol. 7, pp. 1-22, 2018
|
15. |
M. Grandjean, “A Social Network Analysis of Twitter: Mapping the Digital Humanities Community,”Cogent Arts and Humanities, Vol. 1, pp. 117-128, 2016
|
16. |
T. T.A Nguyen and S. Conrad, “An Improved String Similarity Measure based on Combining Information-Theoretic and Edit Distance Methods,” in Proceedings of International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, Springer International Publishing, Vol. 51, pp. 228-239, 2014
|
17. |
M. I.Nasab and R. Javidan,” A New Approach for Finding Semantic Similar Scientific Articles,”Journal of Advanced Computer Science and Technology, Vol. 1, pp. 53-59, 2015
|
18. |
L. L. Rong, Y. Y. Cai,D. Wang, “Relations of Emergency Events Occurring in China based on the Co-Occurrence Analysis,”Systems Engineering, Vol. 6, pp. 1-7, 2011
|
19. |
E. Otte and R. Rousseau, “Social Network Analysis: A Powerful Strategy, also for the Information Sciences,”Journal of Information Science, Vol. 6, pp. 441-453, 2002
|
20. |
B. X. Fang, Y. Jia,Y. Han, “Social Network Analysis — Key Research Problems, Related Work, and Future Prospects,”Bulletin of Chinese Academy of Sciences, Vol. 2, pp. 187-198, 2015
|
21. |
A. F. R.Al-Masoudi and H. S. R. Al-Obeidi, “Smoothing Techniques Evaluation of N-Gram Language Model for Arabic OCR Postprocessing,”Journal of Theoretical and Applied Information Technology, Vol. 3, pp. 432-439, 2015
|