Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 18; no. 5; p. 1380
Main Authors Hernandez-Suarez, Aldo, Sanchez-Perez, Gabriel, Toscano-Medina, Karina, Martinez-Hernandez, Victor, Perez-Meana, Hector, Olivares-Mercado, Jesus, Sanchez, Victor
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 29.04.2018
MDPI
Subjects
Online AccessGet full text
ISSN1424-8220
1424-8220
DOI10.3390/s18051380

Cover

Abstract In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.
AbstractList In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.
In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.
In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based onℓ1regularization.
In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users' opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users' opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.
Author Toscano-Medina, Karina
Perez-Meana, Hector
Hernandez-Suarez, Aldo
Sanchez-Perez, Gabriel
Olivares-Mercado, Jesus
Martinez-Hernandez, Victor
Sanchez, Victor
AuthorAffiliation 1 Instituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, Mexico; ahernandezs1325@alumno.ipn.mx (A.H.-S.); gasanchezp@ipn.mx (G.S.-P.); likatome@gmail.com (K.T.-M.); vicman27df@hotmail.com (V.M.-H.); jolivares@ipn.mx (J.O.-M.)
2 Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK; v.f.Sanchez-Silva@warwick.ac.uk
AuthorAffiliation_xml – name: 2 Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK; v.f.Sanchez-Silva@warwick.ac.uk
– name: 1 Instituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, Mexico; ahernandezs1325@alumno.ipn.mx (A.H.-S.); gasanchezp@ipn.mx (G.S.-P.); likatome@gmail.com (K.T.-M.); vicman27df@hotmail.com (V.M.-H.); jolivares@ipn.mx (J.O.-M.)
Author_xml – sequence: 1
  givenname: Aldo
  orcidid: 0000-0002-4867-2717
  surname: Hernandez-Suarez
  fullname: Hernandez-Suarez, Aldo
– sequence: 2
  givenname: Gabriel
  surname: Sanchez-Perez
  fullname: Sanchez-Perez, Gabriel
– sequence: 3
  givenname: Karina
  surname: Toscano-Medina
  fullname: Toscano-Medina, Karina
– sequence: 4
  givenname: Victor
  surname: Martinez-Hernandez
  fullname: Martinez-Hernandez, Victor
– sequence: 5
  givenname: Hector
  orcidid: 0000-0002-7786-2050
  surname: Perez-Meana
  fullname: Perez-Meana, Hector
– sequence: 6
  givenname: Jesus
  surname: Olivares-Mercado
  fullname: Olivares-Mercado, Jesus
– sequence: 7
  givenname: Victor
  surname: Sanchez
  fullname: Sanchez, Victor
BookMark eNptkU1uFDEQhS0URH5gwQ1aYgOLJv7rtr1BikYhRIoEIsmCleWurh489LSD7QYla27ADTkJnkwUkYiNXS6_-vRUb5_sTGFCQl4y-lYIQw8T07RhQtMnZI9JLmvNOd35p94l-ymtKOVCCP2M7HKjGNVC7JEv5wG8G6tznLJfl2NTpRArP1UXP33OGKuhPD9F7D1kPy2rxXWHsT7K2cG3VF2mTe_Pr9-s-ozLeXTR37jsw_ScPB3cmPDF3X1ALt8fXyw-1GcfT04XR2c1SNnmmpmeicYgSM6oFEoB9EaoxmhH224ABrrh7cBNh6zVLe26tleyZ6bBBpFJcUBOt9w-uJW9in7t4rUNztvbRohL62L2MKIF0TXD0IA0WkvgwnEJLTBletEa6rCw3m1ZV3O3xh7KPqIbH0Af_kz-q12GH7bY5Q1TBfD6DhDD9xlTtmufAMfRTRjmZDktCSgl1cb3q0fSVZjjVFZlyya04oy1vKjebFUQQ0oRh3szjNpN-PY-_KI9fKQFn2-zKF79-J-JvwvSsR4
CitedBy_id crossref_primary_10_1007_s10207_024_00868_2
crossref_primary_10_1007_s10489_022_04178_9
crossref_primary_10_1016_j_cose_2020_102152
crossref_primary_10_1016_j_ipm_2024_103662
crossref_primary_10_1109_TDSC_2022_3149208
crossref_primary_10_1007_s11336_021_09820_y
crossref_primary_10_1016_j_comcom_2021_04_026
crossref_primary_10_1155_2021_6619712
crossref_primary_10_18535_ijsrm_v9i12_ec04
crossref_primary_10_1080_01969722_2022_2148509
crossref_primary_10_1016_j_jbusres_2022_113561
crossref_primary_10_14201_adcaij_31469
crossref_primary_10_1016_j_icte_2021_12_003
crossref_primary_10_1016_j_engappai_2022_105271
crossref_primary_10_1108_IJPDLM_08_2019_0234
crossref_primary_10_3390_su12208649
crossref_primary_10_1109_ACCESS_2024_3508025
crossref_primary_10_1016_j_deveng_2018_08_002
crossref_primary_10_1016_j_nlp_2024_100074
crossref_primary_10_1016_j_osnem_2022_100211
crossref_primary_10_4018_IJCAC_297106
Cites_doi 10.1145/243199.243206
10.1109/INFCOMW.2011.5928903
10.1093/oso/9780198807964.003.0001
10.1002/asi.23456
10.1371/journal.pone.0150989
10.3390/s17091949
10.1109/RTSI.2016.7740574
10.1109/ISI.2016.7745480
10.1007/978-3-642-15939-8_42
10.1109/ICIT.2016.7474819
10.7763/LNSE.2014.V2.134
10.1111/j.2517-6161.1996.tb02080.x
10.1109/TSG.2017.2664043
10.1109/ICACSIS.2016.7872727
10.1109/ISI.2016.7745500
10.1109/MIS.2012.6
10.1109/CSCloud.2017.61
10.1016/j.jnca.2017.10.011
10.1561/1500000011
10.21272/sec.2017.1-03
10.1007/978-3-642-13547-7_14
10.5121/ijdps.2012.3109
10.1017/CBO9780511801389
10.1007/978-3-642-16184-1_1
10.1016/j.diin.2006.03.001
10.1007/978-3-642-29262-0_27
10.1016/j.procs.2016.06.076
10.1177/0894439313493979
10.1109/eCrime.2012.6489519
10.1016/j.knosys.2014.10.013
ContentType Journal Article
Copyright 2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2018 by the authors. 2018
Copyright_xml – notice: 2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2018 by the authors. 2018
DBID AAYXX
CITATION
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
7X8
5PM
DOA
DOI 10.3390/s18051380
DatabaseName CrossRef
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
PML(ProQuest Medical Library)
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central
ProQuest Health & Medical Research Collection
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList CrossRef


Publicly Available Content Database
MEDLINE - Academic
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: http://www.proquest.com/pqcentral?accountid=15518
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Statistics
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_c3b5ff5c49884c23a24c6c179d3690ae
PMC5982517
10_3390_s18051380
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
ADRAZ
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IPNFZ
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RIG
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
7XB
8FK
AZQEC
DWQXO
K9.
PJZUB
PKEHL
PPXIY
PQEST
PQUKI
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c446t-19d1359ec42104377ccd937598a06bfc1c8526f29be16860bb6d74d195e5ee143
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 01:28:06 EDT 2025
Thu Aug 21 18:27:43 EDT 2025
Fri Sep 05 00:17:53 EDT 2025
Fri Jul 25 20:23:10 EDT 2025
Tue Jul 01 01:36:53 EDT 2025
Thu Apr 24 23:04:07 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 5
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c446t-19d1359ec42104377ccd937598a06bfc1c8526f29be16860bb6d74d195e5ee143
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-7786-2050
0000-0002-4867-2717
OpenAccessLink http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s18051380
PMID 29710833
PQID 2108721162
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_c3b5ff5c49884c23a24c6c179d3690ae
pubmedcentral_primary_oai_pubmedcentral_nih_gov_5982517
proquest_miscellaneous_2033377474
proquest_journals_2108721162
crossref_primary_10_3390_s18051380
crossref_citationtrail_10_3390_s18051380
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20180429
PublicationDateYYYYMMDD 2018-04-29
PublicationDate_xml – month: 4
  year: 2018
  text: 20180429
  day: 29
PublicationDecade 2010
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationYear 2018
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References ref_14
ref_13
ref_11
ref_10
ref_53
Lau (ref_22) 2012; 1
(ref_26) 2013; 31
Hastie (ref_50) 2007; 32
ref_51
ref_19
ref_17
ref_16
ref_15
Haustein (ref_7) 2016; 67
Yin (ref_29) 2012; 27
ref_25
ref_24
ref_23
ref_21
ref_28
Wang (ref_43) 2015; 73
Pak (ref_3) 2010; 10
Tibshirani (ref_52) 1996; 58
ref_35
ref_34
ref_33
ref_32
ref_31
ref_30
Balakrishnan (ref_38) 2014; 2
Schoen (ref_27) 2013; 23
ref_39
ref_37
ref_47
ref_46
ref_45
Gai (ref_20) 2017; 8
Rogers (ref_42) 2006; 3
ref_41
ref_40
Pang (ref_44) 2008; 2
ref_1
Saini (ref_36) 2016; 89
ref_2
ref_49
ref_48
ref_9
ref_8
ref_5
ref_4
Gai (ref_18) 2018; 103
Zhang (ref_12) 2017; 12
ref_6
References_xml – volume: 12
  start-page: 144
  year: 2017
  ident: ref_12
  article-title: Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
  publication-title: IEEE Trans. Inf. Forensics Secur.
– ident: ref_9
– ident: ref_32
– volume: 23
  start-page: 528
  year: 2013
  ident: ref_27
  article-title: The power of prediction with social media
  publication-title: Intern. Res.
– ident: ref_51
– ident: ref_53
  doi: 10.1145/243199.243206
– volume: 10
  start-page: 19
  year: 2010
  ident: ref_3
  article-title: Twitter as a Corpus for Sentiment Analysis and Opinion Mining
  publication-title: LREc
– ident: ref_30
  doi: 10.1109/INFCOMW.2011.5928903
– ident: ref_37
  doi: 10.1093/oso/9780198807964.003.0001
– volume: 67
  start-page: 232
  year: 2016
  ident: ref_7
  article-title: Tweets as impact indicators: Examining the implications of automated “bot” accounts on Twitter
  publication-title: J. Assoc. Inf. Sci. Technol.
  doi: 10.1002/asi.23456
– ident: ref_16
– ident: ref_5
  doi: 10.1371/journal.pone.0150989
– ident: ref_39
– ident: ref_6
  doi: 10.3390/s17091949
– ident: ref_1
– ident: ref_10
  doi: 10.1109/RTSI.2016.7740574
– ident: ref_35
– ident: ref_25
  doi: 10.1109/ISI.2016.7745480
– ident: ref_28
  doi: 10.1007/978-3-642-15939-8_42
– ident: ref_8
– ident: ref_11
  doi: 10.1109/ICIT.2016.7474819
– volume: 2
  start-page: 262
  year: 2014
  ident: ref_38
  article-title: Stemming and lemmatization: A comparison of retrieval performances
  publication-title: Lect. Notes Softw. Eng.
  doi: 10.7763/LNSE.2014.V2.134
– ident: ref_4
– ident: ref_31
– volume: 58
  start-page: 267
  year: 1996
  ident: ref_52
  article-title: Regression shrinkage and selection via the lasso
  publication-title: J. R. Stat. Soc. Ser. B Methodol.
  doi: 10.1111/j.2517-6161.1996.tb02080.x
– ident: ref_48
– volume: 8
  start-page: 2431
  year: 2017
  ident: ref_20
  article-title: Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2017.2664043
– ident: ref_17
  doi: 10.1109/ICACSIS.2016.7872727
– ident: ref_45
– ident: ref_23
  doi: 10.1109/ISI.2016.7745500
– volume: 27
  start-page: 52
  year: 2012
  ident: ref_29
  article-title: Using social media to enhance emergency situation awareness
  publication-title: IEEE Intell. Syst.
  doi: 10.1109/MIS.2012.6
– ident: ref_19
  doi: 10.1109/CSCloud.2017.61
– volume: 103
  start-page: 262
  year: 2018
  ident: ref_18
  article-title: A survey on FinTech
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2017.10.011
– volume: 1
  start-page: 217
  year: 2012
  ident: ref_22
  article-title: Social media analytics for cyber attack forensic
  publication-title: Int. Res. J. Eng. Technol.
– ident: ref_34
– volume: 2
  start-page: 1
  year: 2008
  ident: ref_44
  article-title: Opinion mining and sentiment analysis
  publication-title: Found. Trends Inf. Retr.
  doi: 10.1561/1500000011
– ident: ref_21
  doi: 10.21272/sec.2017.1-03
– ident: ref_40
– ident: ref_41
  doi: 10.1007/978-3-642-13547-7_14
– ident: ref_14
– ident: ref_24
  doi: 10.5121/ijdps.2012.3109
– ident: ref_15
  doi: 10.1017/CBO9780511801389
– ident: ref_13
  doi: 10.1007/978-3-642-16184-1_1
– volume: 3
  start-page: 97
  year: 2006
  ident: ref_42
  article-title: A two-dimensional circumplex approach to the development of a hacker taxonomy
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2006.03.001
– ident: ref_33
– ident: ref_2
– ident: ref_46
– ident: ref_47
  doi: 10.1007/978-3-642-29262-0_27
– volume: 89
  start-page: 313
  year: 2016
  ident: ref_36
  article-title: On Continent and Script-Wise Divisions-Based Statistical Measures for Stop-words Lists of International Languages
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2016.06.076
– volume: 32
  start-page: 407
  year: 2007
  ident: ref_50
  article-title: Lars: Least Angle Regression
  publication-title: Ann. Stat.
– volume: 31
  start-page: 649
  year: 2013
  ident: ref_26
  article-title: A meta-analysis of state-of-the-art electoral prediction from Twitter data
  publication-title: Soc. Sci. Comput. Rev.
  doi: 10.1177/0894439313493979
– ident: ref_49
  doi: 10.1109/eCrime.2012.6489519
– volume: 73
  start-page: 311
  year: 2015
  ident: ref_43
  article-title: Novel feature selection method based on harmony search for email classification
  publication-title: Knowl. Based Syst.
  doi: 10.1016/j.knosys.2014.10.013
SSID ssj0023338
Score 2.4604921
Snippet In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and...
SourceID doaj
pubmedcentral
proquest
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
StartPage 1380
SubjectTerms cyber-attacks
Cybersecurity
hackers
security
social media
Social networks
social sentiment sensor
statistics
Twitter
ℓ1 regression
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Pa9VAEB5KT-1BtFaMtrKVHnoJfft7c6zFUgqK2BbqKWR_BB9InuSllN79D_wP_Us6k-Q9XkDw4i0kc9jMzma_LzP7DcAxt9GSjnqOezkSFBVDXqRZlVdBC5ci977vPPfps7m8VVd3-m6j1RfVhA3ywIPjToP0uq51UIVzKghZCRVMwDCKEoldlejri9vYikyNVEsi8xp0hCSS-tMldxh8krQfN3afXqR_giyndZEbG83Fc3g2IkR2NozsBWylZg92N3QD92CHIOKgsPwSvg0nbNk11f3Qvz66Wi5aNm_YzcOcTuswRKbsS0s5GapyZuePPrX5WdfRAXvWVw2wP79-c_a170zfjmcz9-H24uPN-WU-NkzIA7K6LudF5FIXKSgkckpaG0JE-KELV82MrwMPTgtTi8InbpyZeW-iVZEXOumUEDm9gu1m0aTXwESUUglbOWOT8rbPvwa0CLX0oVJ1BicrR5ZhVBOnphY_SmQV5PNy7fMM3q9Nfw4SGn8z-kCzsTYg1ev-BsZCOcZC-a9YyOBgNZfluBSXJbrCEc01IoOj9WNcRJQZqZq0uEebGQYMAmGrMrCTGJgMaPqkmX_v5bhJAlFz--Z_vMFb2EFE5ihdJYoD2O7a-3SIqKfz7_oAfwJ27wIQ
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Li9RAEG50vehBfGJ0lVY8eAk7_e6cZF0cF0ER3YX1FNKPrAOSrJks4t1_4D_0l1jV0xMnIN5CuiChq7q7vq6qrwh5zkwwyKNewlkOAEUGX1Zx0ZSNV9zGwJxLnefevdfHp_LtmTrLF27rnFa53RPTRh16j3fkBwBNLKIVzV9efCuxaxRGV3MLjavkGuNgSVgpvnwzAS4B-GvDJiQA2h-smQUTFMgAuXMGJar-mX85z47cOW6Wt8jN7CfSw41ib5MrsbtDbuywB94lnzeltfQTJvzgJR8-rfuBrjp68n2FZToUXFL6YcBgDKY306MfLg7l4ThiZT1N6QL0989fjH5MLemHXJR5j5wuX58cHZe5U0LpAc6NJasCE6qKXsI0SWGM9wH8DlXZZqFd65m3iuuWVy4ybfXCOR2MDKxSUcUILtN9stf1XXxAKA9CSG4aq02UzqTAqwcJ3wrnG9kW5MV27mqfacSxm8XXGuAETnM9TXNBnk2iFxvujH8JvUIFTAJId51e9MN5nVdP7YVTbau8rKyVnouGS6897CVBALpvYkH2t-qr8xpc138tpiBPp2FYPRgSabrYX4LMAmwEPGAjC2Jmap_90HykW31JPNzIfaiYefj_jz8i18HJshiB4tU-2RuHy_gYHJnRPUnW-gd6SPT2
  priority: 102
  providerName: ProQuest
Title Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization
URI https://www.proquest.com/docview/2108721162
https://www.proquest.com/docview/2033377474
https://pubmed.ncbi.nlm.nih.gov/PMC5982517
https://doaj.org/article/c3b5ff5c49884c23a24c6c179d3690ae
Volume 18
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVFSB
  databaseName: Free Full-Text Journals in Chemistry
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: HH5
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://abc-chemistry.org/
  providerName: ABC ChemistRy
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: KQ8
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: KQ8
  dateStart: 20030101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: DOA
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: EBSCOhost Academic Search Ultimate
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: ABDBF
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: ADMLS
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVFQY
  databaseName: GFMER Free Medical Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: GX1
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVFQY
  databaseName: GFMER Free Medical Journals
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: GX1
  dateStart: 0
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M~E
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central : All journals [free access]
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: RPM
  dateStart: 20030101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
– providerCode: PRVPQU
  databaseName: Health & Medical Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 7X7
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthcomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: BENPR
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: 8FG
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVFZP
  databaseName: Scholars Portal: Open Access Journals [open access]
  customDbUrl:
  eissn: 1424-8220
  dateEnd: 20250930
  omitProxy: true
  ssIdentifier: ssj0023338
  issn: 1424-8220
  databaseCode: M48
  dateStart: 20030101
  isFulltext: true
  titleUrlDefault: http://journals.scholarsportal.info
  providerName: Scholars Portal
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NbtQwELZKe4ED4lcEysogDlwC8b9zQKitulRIrarSlZZTFDtOWanKQjYV9M4b8IY8CTPebNRIPXCJomQiJeNxZj6P5xtC3jBTGeRRT8GXA0CRlU_zkJVp6RW3oWLOxc5zxyf6aCY_z9V8i2x6bPYKXN0K7bCf1Ky9fPfrx_VHmPAfEHECZH-_YhZMS1hA7jvgkDga97EckglciNjQGmu6UvCH2ZpgaPzoyC1F9v5RyDneMHnDA00fkPt96Ej31mP9kGyF5hG5d4NQ8DH5uq62pV9wDxCu--HZatnSRUPPfy6wcodClEpPW8zP4I5nenDtQpvudR0W29O4g4D-_f2H0bPYpb7t6zSfkNn08PzgKO2bJ6QeEF6XsrxiQuXBSwB1UhjjfQWhiMptmWlXe-at4rrmuQtMW505pysjK5aroEKAKOop2W6WTXhGKK-EkNyUVpsgnYm5WA8SvhbOl7JOyNuN7grfM4tjg4vLAhAGqrkY1JyQ14Po9zWdxm1C-zgAgwAyYMcLy_ai6CdU4YVTda28zK2VnouSS689_F4qAYC_DAnZ3QxfsbGqAlRhEfJqnpBXw22YUJglKZuwvAKZDOwFgmIjE2JGwz56ofGdZvEtUnMjHaJi5vn_fOYLcheiL4upKZ7vku2uvQovIcLp3ITcMXMDRzv9NCE7-4cnp2eTuFowiZb9D_1s_ho
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKOQAHxFMEChgEEpeo8St2DgiVQrWlDyHYSsspxI5TVkJJyaaqeucf8D_4UfwSZvLYbiTErbcoHjnRzNie8cx8Q8gLpnONOOohnOXgoMjchYmPsjBzihufM2vbznMHh_HkSH6Yqdka-T3UwmBa5bAntht1Xjm8I98E18SgtxLzNyc_QuwahdHVoYVGpxZ7_vwMXLbF6913IN-XnO-8n25Pwr6rQOjA9WlCluRMqMQ7CVNKobVzOZzRKjFZFNvCMWcUjwueWM9iE0fWxrmWOUuUV96DeQHzXiFXpYgkYvXr2YWDJ8Df69CLhEiizQUzoPICESdXzry2NcDInh1nY64cbzu3yM3eLqVbnSLdJmu-vENurKAV3iVfulJe-hkTjPBSEZ8WVU3nJZ2ezbEsiIIJTD_WGPzBdGq6fW59HW41DVby0zY9gf75-YvRT_4Y81_7ItB75OhSeHifrJdV6R8QynMhJNeZibWXVreBXgcUrhDWZbIIyKuBd6nrYcuxe8b3FNwXZHO6ZHNAni9JTzqsjn8RvUUBLAkQXrt9UdXHab9aUyesKgrlZGKMdFxkXLrYwd6ViziJMh-QjUF8ab_mF-mFhgbk2XIYViuGYLLSV6dAE4GOgMWtZUD0SOyjHxqPlPNvLe43Yi0qph_-_-NPybXJ9GA_3d893HtEroOBZzD6xZMNst7Up_4xGFGNfdJqLiVfL3up_AUIFzCt
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELZKkRAcEL8iUMAgkLhEm9iOfw4IlZZVS6GqoJWWU4gdp6yEkpJNVfXOG_A2PA5Pwkx-thsJcestikdONJ6xZzwz3xDyIla5Qhz1EM5ycFBE7kLjoyzMXMK0z2Nr285zH_flzpF4P0tma-T3UAuDaZXDnthu1Hnl8I58Aq6JRm9FsknRp0UcbE_fnPwIsYMURlqHdhqdiOz58zNw3xavd7dhrV8yNn13uLUT9h0GQgduUBPGJo95YrwTML3gSjmXw3mdGJ1F0hYudjphsmDG-lhqGVkrcyXy2CQ-8R5MDZj3CrmquOCYTqZmF84eB9-vQzLi3ESTRaxB_DmiT66cf22bgJFtO87MXDnqprfIzd5GpZudUN0ma768Q26sIBfeJV-6sl76GZON8IIRnxZVTeclPTybY4kQBXOYHtQYCMLUarp1bn0dbjYNVvXTNlWB_vn5K6af_DHmwvYFoffI0aXw8D5ZL6vSPyCU5ZwLpjItlRdWtUFfBxSu4NZlogjIq4F3qeshzLGTxvcUXBlkc7pkc0CeL0lPOtyOfxG9xQVYEiDUdvuiqo_TXnNTx21SFIkTRmvhGM-YcNLBPpZzaaLMB2RjWL601_9FeiGtAXm2HAbNxXBMVvrqFGgikBGwvpUIiBot--iHxiPl_FuLAY64i0msHv7_40_JNVCS9MPu_t4jch1sPY2BMGY2yHpTn_rHYE819kkruJR8vWxN-QsNKzTo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Social+Sentiment+Sensor+in+Twitter+for+Predicting+Cyber-Attacks+Using+%E2%84%931+Regularization&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Hernandez-Suarez%2C+Aldo&rft.au=Sanchez-Perez%2C+Gabriel&rft.au=Toscano-Medina%2C+Karina&rft.au=Martinez-Hernandez%2C+Victor&rft.date=2018-04-29&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=18&rft.issue=5&rft.spage=1380&rft_id=info:doi/10.3390%2Fs18051380&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_s18051380
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon