Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization
In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based...
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 18; no. 5; p. 1380 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
29.04.2018
MDPI |
Subjects | |
Online Access | Get full text |
ISSN | 1424-8220 1424-8220 |
DOI | 10.3390/s18051380 |
Cover
Abstract | In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization. |
---|---|
AbstractList | In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization. In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization. In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based onℓ1regularization. In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users' opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users' opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization. |
Author | Toscano-Medina, Karina Perez-Meana, Hector Hernandez-Suarez, Aldo Sanchez-Perez, Gabriel Olivares-Mercado, Jesus Martinez-Hernandez, Victor Sanchez, Victor |
AuthorAffiliation | 1 Instituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, Mexico; ahernandezs1325@alumno.ipn.mx (A.H.-S.); gasanchezp@ipn.mx (G.S.-P.); likatome@gmail.com (K.T.-M.); vicman27df@hotmail.com (V.M.-H.); jolivares@ipn.mx (J.O.-M.) 2 Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK; v.f.Sanchez-Silva@warwick.ac.uk |
AuthorAffiliation_xml | – name: 2 Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK; v.f.Sanchez-Silva@warwick.ac.uk – name: 1 Instituto Politecnico Nacional, ESIME Culhuacan, Mexico City 04440, Mexico; ahernandezs1325@alumno.ipn.mx (A.H.-S.); gasanchezp@ipn.mx (G.S.-P.); likatome@gmail.com (K.T.-M.); vicman27df@hotmail.com (V.M.-H.); jolivares@ipn.mx (J.O.-M.) |
Author_xml | – sequence: 1 givenname: Aldo orcidid: 0000-0002-4867-2717 surname: Hernandez-Suarez fullname: Hernandez-Suarez, Aldo – sequence: 2 givenname: Gabriel surname: Sanchez-Perez fullname: Sanchez-Perez, Gabriel – sequence: 3 givenname: Karina surname: Toscano-Medina fullname: Toscano-Medina, Karina – sequence: 4 givenname: Victor surname: Martinez-Hernandez fullname: Martinez-Hernandez, Victor – sequence: 5 givenname: Hector orcidid: 0000-0002-7786-2050 surname: Perez-Meana fullname: Perez-Meana, Hector – sequence: 6 givenname: Jesus surname: Olivares-Mercado fullname: Olivares-Mercado, Jesus – sequence: 7 givenname: Victor surname: Sanchez fullname: Sanchez, Victor |
BookMark | eNptkU1uFDEQhS0URH5gwQ1aYgOLJv7rtr1BikYhRIoEIsmCleWurh489LSD7QYla27ADTkJnkwUkYiNXS6_-vRUb5_sTGFCQl4y-lYIQw8T07RhQtMnZI9JLmvNOd35p94l-ymtKOVCCP2M7HKjGNVC7JEv5wG8G6tznLJfl2NTpRArP1UXP33OGKuhPD9F7D1kPy2rxXWHsT7K2cG3VF2mTe_Pr9-s-ozLeXTR37jsw_ScPB3cmPDF3X1ALt8fXyw-1GcfT04XR2c1SNnmmpmeicYgSM6oFEoB9EaoxmhH224ABrrh7cBNh6zVLe26tleyZ6bBBpFJcUBOt9w-uJW9in7t4rUNztvbRohL62L2MKIF0TXD0IA0WkvgwnEJLTBletEa6rCw3m1ZV3O3xh7KPqIbH0Af_kz-q12GH7bY5Q1TBfD6DhDD9xlTtmufAMfRTRjmZDktCSgl1cb3q0fSVZjjVFZlyya04oy1vKjebFUQQ0oRh3szjNpN-PY-_KI9fKQFn2-zKF79-J-JvwvSsR4 |
CitedBy_id | crossref_primary_10_1007_s10207_024_00868_2 crossref_primary_10_1007_s10489_022_04178_9 crossref_primary_10_1016_j_cose_2020_102152 crossref_primary_10_1016_j_ipm_2024_103662 crossref_primary_10_1109_TDSC_2022_3149208 crossref_primary_10_1007_s11336_021_09820_y crossref_primary_10_1016_j_comcom_2021_04_026 crossref_primary_10_1155_2021_6619712 crossref_primary_10_18535_ijsrm_v9i12_ec04 crossref_primary_10_1080_01969722_2022_2148509 crossref_primary_10_1016_j_jbusres_2022_113561 crossref_primary_10_14201_adcaij_31469 crossref_primary_10_1016_j_icte_2021_12_003 crossref_primary_10_1016_j_engappai_2022_105271 crossref_primary_10_1108_IJPDLM_08_2019_0234 crossref_primary_10_3390_su12208649 crossref_primary_10_1109_ACCESS_2024_3508025 crossref_primary_10_1016_j_deveng_2018_08_002 crossref_primary_10_1016_j_nlp_2024_100074 crossref_primary_10_1016_j_osnem_2022_100211 crossref_primary_10_4018_IJCAC_297106 |
Cites_doi | 10.1145/243199.243206 10.1109/INFCOMW.2011.5928903 10.1093/oso/9780198807964.003.0001 10.1002/asi.23456 10.1371/journal.pone.0150989 10.3390/s17091949 10.1109/RTSI.2016.7740574 10.1109/ISI.2016.7745480 10.1007/978-3-642-15939-8_42 10.1109/ICIT.2016.7474819 10.7763/LNSE.2014.V2.134 10.1111/j.2517-6161.1996.tb02080.x 10.1109/TSG.2017.2664043 10.1109/ICACSIS.2016.7872727 10.1109/ISI.2016.7745500 10.1109/MIS.2012.6 10.1109/CSCloud.2017.61 10.1016/j.jnca.2017.10.011 10.1561/1500000011 10.21272/sec.2017.1-03 10.1007/978-3-642-13547-7_14 10.5121/ijdps.2012.3109 10.1017/CBO9780511801389 10.1007/978-3-642-16184-1_1 10.1016/j.diin.2006.03.001 10.1007/978-3-642-29262-0_27 10.1016/j.procs.2016.06.076 10.1177/0894439313493979 10.1109/eCrime.2012.6489519 10.1016/j.knosys.2014.10.013 |
ContentType | Journal Article |
Copyright | 2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2018 by the authors. 2018 |
Copyright_xml | – notice: 2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2018 by the authors. 2018 |
DBID | AAYXX CITATION 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI 7X8 5PM DOA |
DOI | 10.3390/s18051380 |
DatabaseName | CrossRef ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni Edition) PML(ProQuest Medical Library) ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | CrossRef Publicly Available Content Database MEDLINE - Academic |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BENPR name: ProQuest Central url: http://www.proquest.com/pqcentral?accountid=15518 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Statistics |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_c3b5ff5c49884c23a24c6c179d3690ae PMC5982517 10_3390_s18051380 |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS ADRAZ AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IPNFZ KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RIG RNS RPM TUS UKHRP XSB ~8M 3V. 7XB 8FK AZQEC DWQXO K9. PJZUB PKEHL PPXIY PQEST PQUKI 7X8 PUEGO 5PM |
ID | FETCH-LOGICAL-c446t-19d1359ec42104377ccd937598a06bfc1c8526f29be16860bb6d74d195e5ee143 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 01:28:06 EDT 2025 Thu Aug 21 18:27:43 EDT 2025 Fri Sep 05 00:17:53 EDT 2025 Fri Jul 25 20:23:10 EDT 2025 Tue Jul 01 01:36:53 EDT 2025 Thu Apr 24 23:04:07 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c446t-19d1359ec42104377ccd937598a06bfc1c8526f29be16860bb6d74d195e5ee143 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0002-7786-2050 0000-0002-4867-2717 |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s18051380 |
PMID | 29710833 |
PQID | 2108721162 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_c3b5ff5c49884c23a24c6c179d3690ae pubmedcentral_primary_oai_pubmedcentral_nih_gov_5982517 proquest_miscellaneous_2033377474 proquest_journals_2108721162 crossref_primary_10_3390_s18051380 crossref_citationtrail_10_3390_s18051380 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20180429 |
PublicationDateYYYYMMDD | 2018-04-29 |
PublicationDate_xml | – month: 4 year: 2018 text: 20180429 day: 29 |
PublicationDecade | 2010 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationYear | 2018 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | ref_14 ref_13 ref_11 ref_10 ref_53 Lau (ref_22) 2012; 1 (ref_26) 2013; 31 Hastie (ref_50) 2007; 32 ref_51 ref_19 ref_17 ref_16 ref_15 Haustein (ref_7) 2016; 67 Yin (ref_29) 2012; 27 ref_25 ref_24 ref_23 ref_21 ref_28 Wang (ref_43) 2015; 73 Pak (ref_3) 2010; 10 Tibshirani (ref_52) 1996; 58 ref_35 ref_34 ref_33 ref_32 ref_31 ref_30 Balakrishnan (ref_38) 2014; 2 Schoen (ref_27) 2013; 23 ref_39 ref_37 ref_47 ref_46 ref_45 Gai (ref_20) 2017; 8 Rogers (ref_42) 2006; 3 ref_41 ref_40 Pang (ref_44) 2008; 2 ref_1 Saini (ref_36) 2016; 89 ref_2 ref_49 ref_48 ref_9 ref_8 ref_5 ref_4 Gai (ref_18) 2018; 103 Zhang (ref_12) 2017; 12 ref_6 |
References_xml | – volume: 12 start-page: 144 year: 2017 ident: ref_12 article-title: Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending publication-title: IEEE Trans. Inf. Forensics Secur. – ident: ref_9 – ident: ref_32 – volume: 23 start-page: 528 year: 2013 ident: ref_27 article-title: The power of prediction with social media publication-title: Intern. Res. – ident: ref_51 – ident: ref_53 doi: 10.1145/243199.243206 – volume: 10 start-page: 19 year: 2010 ident: ref_3 article-title: Twitter as a Corpus for Sentiment Analysis and Opinion Mining publication-title: LREc – ident: ref_30 doi: 10.1109/INFCOMW.2011.5928903 – ident: ref_37 doi: 10.1093/oso/9780198807964.003.0001 – volume: 67 start-page: 232 year: 2016 ident: ref_7 article-title: Tweets as impact indicators: Examining the implications of automated “bot” accounts on Twitter publication-title: J. Assoc. Inf. Sci. Technol. doi: 10.1002/asi.23456 – ident: ref_16 – ident: ref_5 doi: 10.1371/journal.pone.0150989 – ident: ref_39 – ident: ref_6 doi: 10.3390/s17091949 – ident: ref_1 – ident: ref_10 doi: 10.1109/RTSI.2016.7740574 – ident: ref_35 – ident: ref_25 doi: 10.1109/ISI.2016.7745480 – ident: ref_28 doi: 10.1007/978-3-642-15939-8_42 – ident: ref_8 – ident: ref_11 doi: 10.1109/ICIT.2016.7474819 – volume: 2 start-page: 262 year: 2014 ident: ref_38 article-title: Stemming and lemmatization: A comparison of retrieval performances publication-title: Lect. Notes Softw. Eng. doi: 10.7763/LNSE.2014.V2.134 – ident: ref_4 – ident: ref_31 – volume: 58 start-page: 267 year: 1996 ident: ref_52 article-title: Regression shrinkage and selection via the lasso publication-title: J. R. Stat. Soc. Ser. B Methodol. doi: 10.1111/j.2517-6161.1996.tb02080.x – ident: ref_48 – volume: 8 start-page: 2431 year: 2017 ident: ref_20 article-title: Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2017.2664043 – ident: ref_17 doi: 10.1109/ICACSIS.2016.7872727 – ident: ref_45 – ident: ref_23 doi: 10.1109/ISI.2016.7745500 – volume: 27 start-page: 52 year: 2012 ident: ref_29 article-title: Using social media to enhance emergency situation awareness publication-title: IEEE Intell. Syst. doi: 10.1109/MIS.2012.6 – ident: ref_19 doi: 10.1109/CSCloud.2017.61 – volume: 103 start-page: 262 year: 2018 ident: ref_18 article-title: A survey on FinTech publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2017.10.011 – volume: 1 start-page: 217 year: 2012 ident: ref_22 article-title: Social media analytics for cyber attack forensic publication-title: Int. Res. J. Eng. Technol. – ident: ref_34 – volume: 2 start-page: 1 year: 2008 ident: ref_44 article-title: Opinion mining and sentiment analysis publication-title: Found. Trends Inf. Retr. doi: 10.1561/1500000011 – ident: ref_21 doi: 10.21272/sec.2017.1-03 – ident: ref_40 – ident: ref_41 doi: 10.1007/978-3-642-13547-7_14 – ident: ref_14 – ident: ref_24 doi: 10.5121/ijdps.2012.3109 – ident: ref_15 doi: 10.1017/CBO9780511801389 – ident: ref_13 doi: 10.1007/978-3-642-16184-1_1 – volume: 3 start-page: 97 year: 2006 ident: ref_42 article-title: A two-dimensional circumplex approach to the development of a hacker taxonomy publication-title: Digit. Investig. doi: 10.1016/j.diin.2006.03.001 – ident: ref_33 – ident: ref_2 – ident: ref_46 – ident: ref_47 doi: 10.1007/978-3-642-29262-0_27 – volume: 89 start-page: 313 year: 2016 ident: ref_36 article-title: On Continent and Script-Wise Divisions-Based Statistical Measures for Stop-words Lists of International Languages publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2016.06.076 – volume: 32 start-page: 407 year: 2007 ident: ref_50 article-title: Lars: Least Angle Regression publication-title: Ann. Stat. – volume: 31 start-page: 649 year: 2013 ident: ref_26 article-title: A meta-analysis of state-of-the-art electoral prediction from Twitter data publication-title: Soc. Sci. Comput. Rev. doi: 10.1177/0894439313493979 – ident: ref_49 doi: 10.1109/eCrime.2012.6489519 – volume: 73 start-page: 311 year: 2015 ident: ref_43 article-title: Novel feature selection method based on harmony search for email classification publication-title: Knowl. Based Syst. doi: 10.1016/j.knosys.2014.10.013 |
SSID | ssj0023338 |
Score | 2.4604921 |
Snippet | In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and... |
SourceID | doaj pubmedcentral proquest crossref |
SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database |
StartPage | 1380 |
SubjectTerms | cyber-attacks Cybersecurity hackers security social media Social networks social sentiment sensor statistics ℓ1 regression |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Pa9VAEB5KT-1BtFaMtrKVHnoJfft7c6zFUgqK2BbqKWR_BB9InuSllN79D_wP_Us6k-Q9XkDw4i0kc9jMzma_LzP7DcAxt9GSjnqOezkSFBVDXqRZlVdBC5ci977vPPfps7m8VVd3-m6j1RfVhA3ywIPjToP0uq51UIVzKghZCRVMwDCKEoldlejri9vYikyNVEsi8xp0hCSS-tMldxh8krQfN3afXqR_giyndZEbG83Fc3g2IkR2NozsBWylZg92N3QD92CHIOKgsPwSvg0nbNk11f3Qvz66Wi5aNm_YzcOcTuswRKbsS0s5GapyZuePPrX5WdfRAXvWVw2wP79-c_a170zfjmcz9-H24uPN-WU-NkzIA7K6LudF5FIXKSgkckpaG0JE-KELV82MrwMPTgtTi8InbpyZeW-iVZEXOumUEDm9gu1m0aTXwESUUglbOWOT8rbPvwa0CLX0oVJ1BicrR5ZhVBOnphY_SmQV5PNy7fMM3q9Nfw4SGn8z-kCzsTYg1ev-BsZCOcZC-a9YyOBgNZfluBSXJbrCEc01IoOj9WNcRJQZqZq0uEebGQYMAmGrMrCTGJgMaPqkmX_v5bhJAlFz--Z_vMFb2EFE5ihdJYoD2O7a-3SIqKfz7_oAfwJ27wIQ priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Li9RAEG50vehBfGJ0lVY8eAk7_e6cZF0cF0ER3YX1FNKPrAOSrJks4t1_4D_0l1jV0xMnIN5CuiChq7q7vq6qrwh5zkwwyKNewlkOAEUGX1Zx0ZSNV9zGwJxLnefevdfHp_LtmTrLF27rnFa53RPTRh16j3fkBwBNLKIVzV9efCuxaxRGV3MLjavkGuNgSVgpvnwzAS4B-GvDJiQA2h-smQUTFMgAuXMGJar-mX85z47cOW6Wt8jN7CfSw41ib5MrsbtDbuywB94lnzeltfQTJvzgJR8-rfuBrjp68n2FZToUXFL6YcBgDKY306MfLg7l4ThiZT1N6QL0989fjH5MLemHXJR5j5wuX58cHZe5U0LpAc6NJasCE6qKXsI0SWGM9wH8DlXZZqFd65m3iuuWVy4ybfXCOR2MDKxSUcUILtN9stf1XXxAKA9CSG4aq02UzqTAqwcJ3wrnG9kW5MV27mqfacSxm8XXGuAETnM9TXNBnk2iFxvujH8JvUIFTAJId51e9MN5nVdP7YVTbau8rKyVnouGS6897CVBALpvYkH2t-qr8xpc138tpiBPp2FYPRgSabrYX4LMAmwEPGAjC2Jmap_90HykW31JPNzIfaiYefj_jz8i18HJshiB4tU-2RuHy_gYHJnRPUnW-gd6SPT2 priority: 102 providerName: ProQuest |
Title | Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization |
URI | https://www.proquest.com/docview/2108721162 https://www.proquest.com/docview/2033377474 https://pubmed.ncbi.nlm.nih.gov/PMC5982517 https://doaj.org/article/c3b5ff5c49884c23a24c6c179d3690ae |
Volume | 18 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVFSB databaseName: Free Full-Text Journals in Chemistry customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: HH5 dateStart: 20010101 isFulltext: true titleUrlDefault: http://abc-chemistry.org/ providerName: ABC ChemistRy – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: KQ8 dateStart: 20010101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: KQ8 dateStart: 20030101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: EBSCOhost Academic Search Ultimate customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: ABDBF dateStart: 20081201 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: ADMLS dateStart: 20081201 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVFQY databaseName: GFMER Free Medical Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: GX1 dateStart: 20010101 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVFQY databaseName: GFMER Free Medical Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: GX1 dateStart: 0 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central : All journals [free access] customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: RPM dateStart: 20030101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 8FG dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVFZP databaseName: Scholars Portal: Open Access Journals [open access] customDbUrl: eissn: 1424-8220 dateEnd: 20250930 omitProxy: true ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M48 dateStart: 20030101 isFulltext: true titleUrlDefault: http://journals.scholarsportal.info providerName: Scholars Portal |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NbtQwELZKe4ED4lcEysogDlwC8b9zQKitulRIrarSlZZTFDtOWanKQjYV9M4b8IY8CTPebNRIPXCJomQiJeNxZj6P5xtC3jBTGeRRT8GXA0CRlU_zkJVp6RW3oWLOxc5zxyf6aCY_z9V8i2x6bPYKXN0K7bCf1Ky9fPfrx_VHmPAfEHECZH-_YhZMS1hA7jvgkDga97EckglciNjQGmu6UvCH2ZpgaPzoyC1F9v5RyDneMHnDA00fkPt96Ej31mP9kGyF5hG5d4NQ8DH5uq62pV9wDxCu--HZatnSRUPPfy6wcodClEpPW8zP4I5nenDtQpvudR0W29O4g4D-_f2H0bPYpb7t6zSfkNn08PzgKO2bJ6QeEF6XsrxiQuXBSwB1UhjjfQWhiMptmWlXe-at4rrmuQtMW505pysjK5aroEKAKOop2W6WTXhGKK-EkNyUVpsgnYm5WA8SvhbOl7JOyNuN7grfM4tjg4vLAhAGqrkY1JyQ14Po9zWdxm1C-zgAgwAyYMcLy_ai6CdU4YVTda28zK2VnouSS689_F4qAYC_DAnZ3QxfsbGqAlRhEfJqnpBXw22YUJglKZuwvAKZDOwFgmIjE2JGwz56ofGdZvEtUnMjHaJi5vn_fOYLcheiL4upKZ7vku2uvQovIcLp3ITcMXMDRzv9NCE7-4cnp2eTuFowiZb9D_1s_ho |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKOQAHxFMEChgEEpeo8St2DgiVQrWlDyHYSsspxI5TVkJJyaaqeucf8D_4UfwSZvLYbiTErbcoHjnRzNie8cx8Q8gLpnONOOohnOXgoMjchYmPsjBzihufM2vbznMHh_HkSH6Yqdka-T3UwmBa5bAntht1Xjm8I98E18SgtxLzNyc_QuwahdHVoYVGpxZ7_vwMXLbF6913IN-XnO-8n25Pwr6rQOjA9WlCluRMqMQ7CVNKobVzOZzRKjFZFNvCMWcUjwueWM9iE0fWxrmWOUuUV96DeQHzXiFXpYgkYvXr2YWDJ8Df69CLhEiizQUzoPICESdXzry2NcDInh1nY64cbzu3yM3eLqVbnSLdJmu-vENurKAV3iVfulJe-hkTjPBSEZ8WVU3nJZ2ezbEsiIIJTD_WGPzBdGq6fW59HW41DVby0zY9gf75-YvRT_4Y81_7ItB75OhSeHifrJdV6R8QynMhJNeZibWXVreBXgcUrhDWZbIIyKuBd6nrYcuxe8b3FNwXZHO6ZHNAni9JTzqsjn8RvUUBLAkQXrt9UdXHab9aUyesKgrlZGKMdFxkXLrYwd6ViziJMh-QjUF8ab_mF-mFhgbk2XIYViuGYLLSV6dAE4GOgMWtZUD0SOyjHxqPlPNvLe43Yi0qph_-_-NPybXJ9GA_3d893HtEroOBZzD6xZMNst7Up_4xGFGNfdJqLiVfL3up_AUIFzCt |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELZKkRAcEL8iUMAgkLhEm9iOfw4IlZZVS6GqoJWWU4gdp6yEkpJNVfXOG_A2PA5Pwkx-thsJcestikdONJ6xZzwz3xDyIla5Qhz1EM5ycFBE7kLjoyzMXMK0z2Nr285zH_flzpF4P0tma-T3UAuDaZXDnthu1Hnl8I58Aq6JRm9FsknRp0UcbE_fnPwIsYMURlqHdhqdiOz58zNw3xavd7dhrV8yNn13uLUT9h0GQgduUBPGJo95YrwTML3gSjmXw3mdGJ1F0hYudjphsmDG-lhqGVkrcyXy2CQ-8R5MDZj3CrmquOCYTqZmF84eB9-vQzLi3ESTRaxB_DmiT66cf22bgJFtO87MXDnqprfIzd5GpZudUN0ma768Q26sIBfeJV-6sl76GZON8IIRnxZVTeclPTybY4kQBXOYHtQYCMLUarp1bn0dbjYNVvXTNlWB_vn5K6af_DHmwvYFoffI0aXw8D5ZL6vSPyCU5ZwLpjItlRdWtUFfBxSu4NZlogjIq4F3qeshzLGTxvcUXBlkc7pkc0CeL0lPOtyOfxG9xQVYEiDUdvuiqo_TXnNTx21SFIkTRmvhGM-YcNLBPpZzaaLMB2RjWL601_9FeiGtAXm2HAbNxXBMVvrqFGgikBGwvpUIiBot--iHxiPl_FuLAY64i0msHv7_40_JNVCS9MPu_t4jch1sPY2BMGY2yHpTn_rHYE819kkruJR8vWxN-QsNKzTo |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Social+Sentiment+Sensor+in+Twitter+for+Predicting+Cyber-Attacks+Using+%E2%84%931+Regularization&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Hernandez-Suarez%2C+Aldo&rft.au=Sanchez-Perez%2C+Gabriel&rft.au=Toscano-Medina%2C+Karina&rft.au=Martinez-Hernandez%2C+Victor&rft.date=2018-04-29&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=18&rft.issue=5&rft.spage=1380&rft_id=info:doi/10.3390%2Fs18051380&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_s18051380 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |