[1]
P.K. Pandia, "Impact of social media on culture, society and education", J. Adv. Res. Human. Social Sci., vol. 5, no. 3, pp. 17-24, 2018.
[2]
"The positive and negative impact of social media on education, teenagers, business and society", Int. J. Innov. Res. Sci. Eng. Technol., vol. 6, no. 10, pp. 19652-19657, 2017.
[3]
W.A. Zargar, "Impact of social media on education with positive and negative aspects", Int. J. Manag. IT Eng., vol. 8, no. 3, pp. 145-153, 2018.
[7]
B. Viswanath, and M. Ahmad Bashir, "Towards detecting anomalous user behavior in online social networks", Proceedings of the 23rd USENIX Security Symposium (USENIX Security), 2014, pp. 223-238.
[8]
A. Sheshasaayee, and G. Thailambal, "Comparison of classification algorithms in text mining", Int. J. Pure Appl. Math., vol. 116, no. 22, pp. 425-433, 2017.
[11]
J. Ambient Intell. Humaniz. Comput., vol. 1, pp. 1-15, 2019.
[12]
S.K. Jayanthi, and C. Kavi Priya, "Clustering approach for classification of research articles based on keyword search", Int. J. Adv. Res. Comput. Eng. Technol., vol. 7, no. 1, pp. 86-90, 2018.
[13]
"Mayra Rodriguez, Cesar Comin, Dalcimar Casanova, Odemir Bruno, Diego Amancio, Francisco Rodrigues, and Luciano da F. Costa, Clustering algorithms: A comparative approach", PLoS One, vol. 14, no. 1, pp. 1-34, 2016.
[17]
S.K. Gah, and E. Kuada, "Sentiment analysis of twitter feeds, effect of feature hashing on model accuracy", 2018 IEEE 7th International Conference on Adaptive Science & Technology (ICAST), Accra, Ghana, 2018.
[24]
A.A.A. Esmin, R.L. De Oliveira Jr, and S. Matwin, "Hierarchical classification approach to emotion recognition in twitter", In.2012 11th International Conference on Machine Learning and Applications, Boca Raton, FL, USA, 2012, pp. 381-385., .
[26]
P.M. Jayle, and S.U. Bohra, "Review on opinion targets and opinion words extraction techniques from online reviews, international research", J. Eng. Technol., vol. 4, no. 3, pp. 2320-2325, 2017.
[29]
S.K. Chaturvedi, V. Richariya, and N. Tiwari, "Anomaly detection in network using data mining techniques", Int. J. Emerg. Technol. Adv. Eng., vol. 2, no. 5, pp. 349-353, 2012.
[30]
D. Sinanc, and U. Yavanoglu, "A new approach to detecting content anomalies in wikipedia", In: 2013 12th International Conference on Machine Learning and Applications, Miami, FL, USA, 2013, pp. 288-293.
[31]
L. Tran, L. Fan, and C. Shahabi, "Distance-based outlier detection in data streams", Proc. VLDB Endow., vol. 9, no. 12, pp. 1089-1100, 2016.
[34]
M.A. Saddam, E.K. Dewantara, and A. Solichin, "Sentiment analysis of flood disaster management in jakarta on twitter using support vector machines", Synchronous: Inform. Eng. J. Res., vol. 8, no. 1, pp. 470-473, 2023.
[35]
S.B. Wankhede, "Anomaly detection using machine learning techniques", In: 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), Bombay, India, 2019, pp. 1-3.
[37]
K.S. Gundu, L.P. Dhyaram, G.N.V. Ramana Rao, and G.S. Deepak, "Comparative analysis of energy consumption in text processing models", In: Rajagopal S., Faruki P., Popat K., Eds., Advancements in Smart Computing and Information Security. ASCIS 2022. Communications in Computer and Information Science., vol. 1759. Springer: Cham, 2022.
[39]
L.P. Del Bosque, "Prediction of aggressive comments in social media: An exploratory study", IEEE Latin America Transact., vol. 14, no. 7, pp. 3474-3480, 2016.
[43]
M. Zaw, and P. Tandayya, "Multi-level sentiment information extraction using the CRbSA algorithm", In: 15th International Joint Conference on Computer Science and Software Engineering (JCSSE), Nakhonpathom, Thailand, 2018, pp. 1-6.
[44]
S. Garg, and S.N. Singh, "Auto predictive customer feedback from textual analysis of online chat logs", In", 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 2018, pp. 1-6, .
[49]
Z. Wang, and Z. Qu, "Research on web text classification algorithm based on improved CNN and SVM", In. IEEE 17th International Conference on Communication Technology (ICCT), Chengdu, China, 2017, pp. 1958-1961, .
[51]
W. Jia, R.M. Shukla, and S. Sengupta, "Anomaly detection using supervised learning and multiple statistical methods", In. 18th IEEE International Conference On Machine Learning And Applications (ICMLA), Boca Raton, FL, USA 2019, pp. 1291-1297, .
[52]
F. Huch, M. Golagha, A. Petrovska, and A. Krauss, "Machine learning-based run-time anomaly detection in software systems, an industrial evaluation", In IEEE Workshop on Machine Learning Techniques for Software Quality Evaluation (MaLTeSQuE), Campobasso, Italy, 2018, pp. 13-18
[55]
M. Shirakawa, T. Hara, and S. Nishio, "N-gram IDF: A global term weighting scheme based on information distance", WWW '15: Proceedings of the 24th International Conference on World Wide Web, vol. 5. 2015, pp. 2373-2382.
[57]
Y. Zhang, X. Ruan, H. Wang, H. Wang, and S. He, "Twitter trends manipulation: A first look inside the security of twitter trending", IEEE Trans. Inf. Forensics Security, vol. 12, no. 1, pp. 144-156, 2017.
[63]
N.K. Jha, "An approach towards text to emoticon conversion and vice-versa using NLTK and wordnet", In 2nd International Conference on Data Science and Business Analytics (ICDSBA), Changsha, China, 2018, pp. 161-166
[65]
S. Zahoor, and R. Rohilla, "Twitter sentiment analysis using lexical or rule based approach: A case study", In 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2020, pp. 537-542
[67]
R. Hermansyah, and R. Sarno, "Sentiment analysis about product and service evaluation of PT telekomunikasi indonesia TBK from tweets using textBlob; Naive Bayes & K-NN Method", In International Seminar on Application for Technology of Information and Communication (iSemantic), Semarang, Indonesia, 2020, pp. 511-516
[68]
A.K. Kalia, N. Buchler, A. DeCostanza, and M.P. Singh, "Computing team process measures from the structure and content of broadcast collaborative communications", IEEE Transact. Comput. Social Syst., vol. 4, no. 2, pp. 26-39, 2017.
[74]
R. Primartha, and B.A. Tama, "Anomaly detection using random forest: A performance revisited", In International Conference on Data and Software Engineering (ICoDSE), Palembang, Indonesia, 2017, pp. 1-6
[75]
T. Chengsheng, X. Bing, and L. Huacheng, "The application of the adaboost algorithm in the text classification", In 2nd IEEE Advanced Information Management,Communicates, Electronic and Automation Control Conference (IMCEC), Xi'an, China, 2018, pp. 1792-1796
[76]
R. Islam, "Early stage DRC prediction using ensemble machine learning algorithms, IEEE", Can. J. Electr. Comput. Eng., vol. 45, no. 4, pp. 354-364, 2022.