SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Nahar V, Unankard S, Li X, Pang C. Lect. Notes Comput. Sci. 2012; 7235: 767-774.

Copyright

(Copyright © 2012, Holtzbrinck Springer Nature Publishing Group)

DOI

10.1007/978-3-642-29253-8_75

PMID

unavailable

Abstract

The rapid growth of social networking and gaming sites is associated with an increase of online bullying activities which, in the worst scenario, result in suicidal attempts by the victims. In this paper, we propose an effective technique to detect and rank the most influential persons (predators and victims). It simplifies the network communication problem through a proposed detection graph model. The experimental results indicate that this technique is highly accurate. 2012 Springer-Verlag Berlin Heidelberg.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print