1.
Anees Ul Hassan, Jamil Hussain, Musarrat Hussain, Muhammad Sadiq, Sungyoung Lee, (2017) “Sentiment Analysis of Social Networking Sites (SNS) Data using Machine Learning Approach for the Measurement of Depressionâ€, IEEE xplore, Pages 138 - 140.
2.
Alireza Farasat, Geoffrey Gross, Rakesh Nagi, and Alexander G. Nikolaev (2016), “Social Network Analysis With Data Fusionâ€, IEEE, Volume: 3 , Issue: 2, Page s: 88 – 99
3.
Stefan Stieglitza, Milad Mirbabaiea, Björn Rossa, Christoph Neubergerb, “Social media analytics – Challenges in topic discovery, data collection, and data preparationâ€, Elsevier, 2017.
4.
Anton Ivaschenko, Anastasiya Khorina, Vladislav Isayko, Daniil Krupin, Viktor Bolotsky, and Pavel Sitnikov (2018), “Modeling of User Behavior for Social Media Analysisâ€, IEEE, Pages: 1 - 4.
5.
Ravi vatrapu1, Raghava Rao Mukkamala, Abid Hussain, Benjamin Flesch, (2016) “Social Set Analysis: A Set Theoretical Approach to Big Data Analyticsâ€, IEEE, Vol. 4, Pages: 2542 – 2571
6.
Flora Amato, Vincenzo Moscato, Antonio Picariello and Giancarlo Sperl, (2016) “Multimedia Social Network modeling: a proposalâ€, IEEE, 448 – 453
7.
Sun Danpeng ; Jiang Rui, “Research on Congestion Control of Multimedia Data Stream in Network Transmissionâ€, 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation, Year: 2015, Page s: 856 – 859
8.
K M Archana Patel ; Richa Martoli (2016), “Congestion control techniques in networking†International Conference on Communication and Signal Processing (ICCSP), Year: 2016, Page s: 1831 – 1835
9.
Yuan Xinlei ; Li Shuping, (2015) “Multimedia Data Flow Transmission Technology Research in the Networkâ€, 8th International Conference on Intelligent Computation Technology and Automation (ICICTA), IEEE, Page s: 560 – 563
10.
Danyang Zhu ; Changqiao Xu ; Jiuren Qin ; Zan Zhou ; Jianfeng Guan (2017), “Mobility-aware multimedia data transfer using Multipath TCP in Vehicular Networkâ€, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Pages: 1041 – 1046
11.
Yuanlong Cao ; Changqiao Xu ; Jianfeng Guan ; Hongke Zhang (2014), “TCP-friendly CMT-based multimedia distribution over multi-homed wireless networksâ€, 2014 IEEE Wireless Communications and Networking Conference (WCNC), Page s: 3028 – 3033
12.
Joe, M. M., & Ramakrishnan, B. (2017). Novel authentication procedures for preventing unauthorized access in social networks. Peer-to-Peer Networking and Applications, 10(4), 833-843.
13.
Altunbey, F., & Alatas, B. (2015). Overlapping community detection in social networks using parliamentary optimization algorithm. International Journal of Computer Networks and Applications, 2(1), 12-19.
14.
Joe, M. M., & Ramakrishnan, D. B. (2014). A survey of various security issues in online social networks. International Journal of Computer Networks and Applications, 1(1), 11-14.
15.
Ozbay, Feyza Altunbey, and Bilal Alatas. "Discovery of Multi-Objective Overlapping Communities within Social Networks using a Socially Inspired Metaheuristic Algorithm." International Journal of Computer Networks and Applications, 4(6), 148 - 158.
16.
Joe, M. M., Ramakrishnan, B., & Shaji, R. S. (2013). Prevention of losing user account by enhancing security module: A facebook case. Journal of emerging technologies in web intelligence, 5(3), 247-256.
17.
Joe, M. M., & Ramakrishan, B. (2014). Enhancing security module to prevent data hacking in online social networks. Journal of Emerging Technologies in Web Intelligence, 6(2), 184-192.
18.
Joe, M. M., Shaji, R. S., & Dhanaseelan, F. R. (2012). Detection of M-worm to provide secure computing in social networks. Elixir International Journal–September-50, 10363-10365.
19.
Joe, M. M., Ramakrishnan, B., & Das, R. (2016). Designing a Novel Two-Tier Authentication Algorithm for Web Service Architecture. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 8(9), 67-75.
20.
Joe, M. M., Ramakrishnan, B., & Shaji, R. S. (2013). Modeling future generation e-mail communication model for improving quality of service. Journal of emerging technologies in web intelligence, 5(4), 385-394