Carrasquel, J.C., Chuburov, S.A., Lomazova, I.A. (2021).
Pre-processing Network Messages of Trading Systems
into Event Logs for Process Mining. In: Tools and
Methods of Program Analysis. TMPA 2019.
Communications in Computer and Information
Science, vol 1288. Springer, Cham. Pp. 88-100.
Dang-Pham, D., Pittayachawan, S., Bruno, V. (2020).
Applications of social network analysis in behavioural
information security research: Concepts and empirical
analysis. In: Computers & Security, 2017. Vol. 68, pp.
1–15.
Dawot N.I.M. (2014). A review of features and functional
building blocks of social media. In: Proceedings of the
8th. Malaysian Software Engineering Conference
(MySEC). IEEE, 2014. Pp. 177-182.
De Medeiros, A.K.A., Van der Aalst, W., Pedrinaci, C.
(2008). Semantic process mining tools: Core building
blocks. In: Proceedings of the 16th European
Conference on Information Systems. Galway, Ireland,
2008. Pp. 15-23.
Dmitriev, I, Zamyatina, E. (2020). How to Prevent Harmful
Information Spreading in Social Networks Using
Simulation Tools. In: Analysis of Images, Social
Networks and Texts. AIST 2019. Communications in
Computer and Information Science. Vol. 1086, pp.
201–213. Springer, Cham.
Ilieva, D. (2018). Fake News, Telecommunications And
Information Security. In: International Journal
“Information Theories and Applications”. Vol. 25(2),
pp. 174–181.
Kang, H., Munoz, D. (2015). A dynamic network analysis
approach for evaluating knowledge dissemination in a
multi-disciplinary collaboration network in obesity
research. In: 2015 Winter Simulation Conference
(WSC). Pp. 1319-1330.
Kietzmann J.H. (2011). Social media? Get serious!
Understanding the functional building blocks of social
media. In: Business horizons. 2011, vol. 54, №. 3. Pp.
241-251.
Mikov A., Zamyatina E., Kozlov A., Ermakov S. (2013).
Some Problems of the Simulation Model Efficiency and
Flexibility. In: Proceedings of the 8-th EUROSIM
Congress on Modelling and Simulation EUROSIM,
2013, Cardiff, Wales, United Kingdom. Pp. 532–538.
Mukala, P., Buijs, J., Leemans, M., van der Aalst, W.
(2015). Learning analytics on coursera event data: a
process mining approach. In Proceedings of the 5th
International Symposium on Data-driven Process
Discovery and Analysis (SIMPDA 2015), Vienna,
Austria, December 9-11, 2015. CEUR Workshop
Proceedings; vol. 1527. Pp. 18-32.
Peña-Araya, V. (2015). Galean: Visualization of
Geolocated News Events from Social Media. In:
Proceedings of the 38th International ACM SIGIR
Conference on Research and Development in
Information Retrieval (SIGIR '15). ACM New York.
2015. Pp. 1041-1042.
Ritter A. (2012). Open domain event extraction from twitter
In: Proceedings of the 18th ACM SIGKDD
international conference on Knowledge discovery and
data mining. 2012. Pp. 1104-1112.
Shalyaeva, I., Lyadova, L., Lanin, V. (2016). Events
Analysis Based on Internet Information Retrieval and
Process Mining Tools. In: Proceedings of 10th
International Conference on Application of Information
and Communication Technologies (AICT2016)
. Baku,
2016, pp. 168-172.
Shalyaeva, I., Lyadova, L., Lanin, V. (2017). Ontology-
Driven System for Monitoring Global Processes on
Basis of Internet News. In: Proceedings of IEEE 11th
International Conference on Application of Information
and Communication Technologies (AICT2017).
Moscow, 2017, pp. 385-389.
Tumbinskaya, M.V. (2017). Protection of information in
social networks from social engineering attacks of the
attacker. In: Journal of Applied Informatics. Vol.
12(3(69)), pp. 88–102.
Van der Aalst, W.M.P., Reijers, H. ., Song M. (2005).
Discovering social networks from event logs. In:
Computer Supported Cooperative Work (CSCW). 2005,
vol. 14, № 6. Pp. 549-593.
Vokhmintsev, A., Melnikov, A. (2013). The Knowledge on
the Basis of Fact Analysis in Business Intelligence. In:
Digital Product and Process Development Systems.
NEW PROLAMAT 2013. IFIP Advances in Information
and Communication Technology, vol 411. Springer,
Berlin, Heidelberg. Pp.134-141.
Yang, D., Liao, X., Shen, H., Cheng, X., Chen, G. (2018).
Dynamic node immunization for restraint of harmful
information diffusion in social networks. In: Physica A:
Statistical Mechanics and its Applications. Vol. 503,
pp. 640–649. DOI: 10.1016/j.physa.2018.02.128.
Zamyatina, E., Dmitriev, I. (2020). How to Prevent
Harmful Information Spreading in Social Networks
Using Simulation Tools. In: Analysis of Images, Social
Networks and Texts. AIST 2019. Communications in
Computer and Information Science. Vol. 1086, pp.
201–213. Springer, Cham.
Zavarella V. (2014). An Ontology-Based Approach to
Social Media Mining for Crisis Management. In: SSA-
SMILE@ ESWC, 2014. Pp. 55-66.
Zhan, L., Jiang, X. (2019). Survey on Event Extraction
Technology in Information Extraction Research Area.
In: Proceedings of the IEEE 3rd Information
Technology, Networking, Electronic and Automation
Control Conference (ITNEC). Chengdu, China, 2019.
Pp. 2121-2126.
Zhao, N., Cheng, X., Guo, X. (2018). Impact of information
spread and investment behavior on the diffusion of
internet investment products. In: Physica A: Statistical
Mechanics and its Applications. Vol. 512, pp. 427–436.