These are the sources and citations used to research FYP and Research M. This bibliography was generated on Cite This For Me on

  • Journal

    Adewole, K. S., Anuar, N. B., Kamsin, A., Varathan, K. D. and Razak, S. A.

    Malicious accounts: Dark of the social networks

    2017 - Journal of Network and Computer Applications

    In-text: (Adewole et al. 41-42)

    Your Bibliography: Adewole, Kayode Sakariyah et al. "Malicious Accounts: Dark Of The Social Networks." Journal of Network and Computer Applications 79 (2017): 41-42. Web. 15 Oct. 2019.

  • Journal

    Ahmed, H., Traore, I. and Saad, S.

    Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques

    2017 - Lecture Notes in Computer Science

    In-text: (Ahmed, Traore and Saad 127-138)

    Your Bibliography: Ahmed, Hadeer, Issa Traore, and Sherif Saad. "Detection Of Online Fake News Using N-Gram Analysis And Machine Learning Techniques." Lecture Notes in Computer Science 10618 (2017): 127-138. Web. 11 Nov. 2019.

  • Journal

    Al-Janabi, M., Quincey, E. D. and Andras, P.

    Using supervised machine learning algorithms to detect suspicious URLs in online social networks

    2017 - Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 - ASONAM '17

    In-text: (Al-Janabi, Quincey and Andras 1)

    Your Bibliography: Al-Janabi, Mohammed, Ed de Quincey, and Peter Andras. "Using Supervised Machine Learning Algorithms To Detect Suspicious Urls In Online Social Networks." Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 - ASONAM '17 (2017): 1. Web. 17 Oct. 2019.

  • Book

    Anderson, D. and Ackerman-Anderson, L. S.

    Beyond change management

    2010 - Pfeiffer - San Francisso

    In-text: (Anderson and Ackerman-Anderson 18)

    Your Bibliography: Anderson, Dean, and Linda S Ackerman-Anderson. Beyond Change Management. 1st ed. San Francisso: Pfeiffer, 2010. Print.

  • Book

    Andrews, R.

    Research Questions

    2003 - London - Continuum

    In-text: (Andrews)

    Your Bibliography: Andrews, Richard. Research Questions. 1st ed. Continuum: London, 2003. Print.

  • Journal

    Brewer, G. and Kerslake, J.

    Cyberbullying, self-esteem, empathy and loneliness

    2015 - Computers in Human Behavior

    In-text: (Brewer and Kerslake 255-260)

    Your Bibliography: Brewer, G., and J. Kerslake. "Cyberbullying, Self-Esteem, Empathy And Loneliness." Computers in Human Behavior 48 (2015): 255-260. Web. 27 Nov. 2019.

  • Book

    British Standards Institution

    BS ISO 21500

    2012 - The British Standards Institution

    In-text: (British Standards Institution)

    Your Bibliography: British Standards Institution. BS ISO 21500. 1st ed. The British Standards Institution, 2012. Print.

  • Website

    Bull, J., Jobstvogt, N., Böhnke-Henrichs, A., Mascarenhas, A., Sitas, N., Baulcomb, C., Lambini, C., Rawlins, M., Baral, H., Zähringer, J., Carter-Silk, E., Balzan, M., Kenter, J., Häyhä, T., Petz, K. and Koss, R.

    Strengths, Weaknesses, Opportunities and Threats: A SWOT analysis of the ecosystem services framework

    2019 - ElsevierB.V

    In-text: (Bull et al.)

    Your Bibliography: Bull, J.W. et al. "Strengths, Weaknesses, Opportunities And Threats: A SWOT Analysis Of The Ecosystem Services Framework." N.p., 2019. Print.

  • Journal

    Carneiro, T., Medeiros Da Nobrega, R. V., Nepomuceno, T., Bian, G., De Albuquerque, V. H. C. and Filho, P. P. R.

    Performance Analysis of Google Colaboratory as a Tool for Accelerating Deep Learning Applications

    2018 - IEEE Access

    In-text: (Carneiro et al. 61677-61685)

    Your Bibliography: Carneiro, Tiago et al. "Performance Analysis Of Google Colaboratory As A Tool For Accelerating Deep Learning Applications." IEEE Access 6 (2018): 61677-61685. Web. 29 Jan. 2020.

  • Report

    Childnet International

    Project deSHAME

    2017 - Childnet International

    In-text: (Childnet International)

    Your Bibliography: Childnet International. Project Deshame. Childnet International, 2017. Web. 28 Oct. 2019.

  • Book

    Chollet, F.

    Deep learning with Python

    2018 - Manning Publications Co. - New York

    In-text: (Chollet 10-380)

    Your Bibliography: Chollet, François. Deep Learning With Python. 1st ed. New York: Manning Publications Co., 2018. Print.

  • Journal

    Cluley, G.

    Sizing up the malware threat – key malware trends for 2010

    2010 - Network Security

    In-text: (Cluley 8-10)

    Your Bibliography: Cluley, Graham. "Sizing Up The Malware Threat – Key Malware Trends For 2010." Network Security 2010.4 (2010): 8-10. Web. 4 Nov. 2019.

  • Book

    Conway, D. and White, J. M.

    Machine learning for hackers

    2012 - O’Reilly Media, Inc. - Sebastopol, CA

    In-text: (Conway and White)

    Your Bibliography: Conway, Drew, and John Myles White. Machine Learning For Hackers. 1st ed. Sebastopol, CA: O’Reilly Media, Inc., 2012. Print.

  • Book

    Cryer, P.

    The Research Student's Guide to Success

    2006 - Open University Press - Maidenhead

    In-text: (Cryer)

    Your Bibliography: Cryer, Pat. The Research Student's Guide To Success. 3rd ed. Maidenhead: Open University Press, 2006. Print.

  • Website

    Data Protection Act 2018

    2018 - The Stationary Office

    In-text: ("Data Protection Act 2018")

    Your Bibliography: "Data Protection Act 2018." Legislation.gov.uk. N.p., 2018. Web. 12 Nov. 2019.

  • Journal

    DeLone, W. H. and McLean, E. R.

    Information Systems Success: The Quest for the Dependent Variable

    1992 - Information Systems Research

    In-text: (DeLone and McLean 60-95)

    Your Bibliography: DeLone, William H., and Ephraim R. McLean. "Information Systems Success: The Quest For The Dependent Variable." Information Systems Research 3.1 (1992): 60-95. Web. 14 Nov. 2019.

  • Book

    Denscombe, M.

    The good research guide

    2011 - McGraw-Hill/Open University Press - Maidenhead, England

    In-text: (Denscombe)

    Your Bibliography: Denscombe, Martyn. The Good Research Guide. 4th ed. Maidenhead, England: McGraw-Hill/Open University Press, 2011. Print.

  • Report

    Ditch the Label

    The Annual Bullying Survey 2018

    2018 - Ditch the Label

    In-text: (Ditch the Label)

    Your Bibliography: Ditch the Label. The Annual Bullying Survey 2018. Ditch the Label, 2018. Web. 24 Oct. 2019.

  • Journal

    Egan, S. K. and Perry, D. G.

    Does low self-regard invite victimization?

    1998 - Developmental Psychology

    In-text: (Egan and Perry 299-309)

    Your Bibliography: Egan, Susan K., and David G. Perry. "Does Low Self-Regard Invite Victimization?." Developmental Psychology 34.2 (1998): 299-309. Web. 15 Nov. 2019.

  • Journal

    Etaiwi, W. and Naymat, G.

    The Impact of applying Different Preprocessing Steps on Review Spam Detection

    2017 - Procedia Computer Science

    In-text: (Etaiwi and Naymat 273-279)

    Your Bibliography: Etaiwi, Wael, and Ghazi Naymat. "The Impact Of Applying Different Preprocessing Steps On Review Spam Detection." Procedia Computer Science 113.2017 (2017): 273-279. Web. 24 Jan. 2020.

  • Journal

    Fayyad, U., Piatetsky-Shapiro, G. and Smyth, P.

    Knowledge Discovery and Data Mining: Towards a Unifying Framework

    1996 - Data Mining and Knowledge Discovery

    In-text: (Fayyad, Piatetsky-Shapiro and Smyth 82-88)

    Your Bibliography: Fayyad, Usama, Gregory Piatetsky-Shapiro, and Padhraic Smyth. "Knowledge Discovery And Data Mining: Towards A Unifying Framework." Data Mining and Knowledge Discovery (1996): 82-88. Web. 1 Jan. 2019.

  • Book

    Fersini, E., Liu, B., Messina, E. and Pozzi, F. A.

    Sentiment analysis in social networks

    2016 - Morgan Kaufmann

    In-text: (Fersini et al.)

    Your Bibliography: Fersini, Elisabetta et al. Sentiment Analysis In Social Networks. 1st ed. Morgan Kaufmann, 2016. Print.

  • Journal

    Galán-GarcÍa, P., Puerta, J. G. D. L., Gómez, C. L., Santos, I. and Bringas, P. G.

    Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying

    2015 - Logic Journal of IGPL

    In-text: (Galán-GarcÍa et al. 43-51)

    Your Bibliography: Galán-GarcÍa, Patxi et al. "Supervised Machine Learning For The Detection Of Troll Profiles In Twitter Social Network: Application To A Real Case Of Cyberbullying." Logic Journal of IGPL (2015): 43-51. Web. 6 Dec. 2019.

  • Book

    Géron, A.

    Hands-on machine learning with Scikit-Learn and TensorFlow

    2017 - O’Reilly Media, Inc. - Sebastopol, CA

    In-text: (Géron)

    Your Bibliography: Géron, Aurélien. Hands-On Machine Learning With Scikit-Learn And Tensorflow. 2nd ed. Sebastopol, CA: O’Reilly Media, Inc., 2017. Print.

  • Book

    Graham, N.

    PRINCE2 for dummies

    2013 - John Wiley & Sons - Hoboken, N.J.

    In-text: (Graham)

    Your Bibliography: Graham, Nick. PRINCE2 For Dummies. 1st ed. Hoboken, N.J.: John Wiley & Sons, 2013. Print.

  • Book

    Guest, G. and Namey, E. E.

    Public health research methods

    2015 - SAGE - London

    In-text: (Guest and Namey)

    Your Bibliography: Guest, Greg, and Emily E Namey. Public Health Research Methods. 1st ed. London: SAGE, 2015. Print.

  • Journal

    Haidar, B., Chamoun, M. and Yamout, F.

    Cyberbullying Detection: A Survey on Multilingual Techniques

    2016 - 2016 European Modelling Symposium (EMS)

    In-text: (Haidar, Chamoun and Yamout 409-416)

    Your Bibliography: Haidar, Batoul, Maroun Chamoun, and Fadi Yamout. "Cyberbullying Detection: A Survey On Multilingual Techniques." 2016 European Modelling Symposium (EMS) (2016): 409-416. Web. 12 Dec. 2019.

  • Book

    Hall, D., Chambers, I. and Gray, D.

    Business studies

    2008 - Pearson - Harlow

    In-text: (Hall, Chambers and Gray)

    Your Bibliography: Hall, Dave, Ian Chambers, and David Gray. Business Studies. 4th ed. Harlow: Pearson, 2008. Print.

  • Book

    Han, J., Kamber, M. and Pei, J.

    Data mining: Concepts and techniques

    2012 - Elsevier/Morgan Kaufmann - Amsterdam

    In-text: (Han, Kamber and Pei)

    Your Bibliography: Han, Jiawei, Micheline Kamber, and Jian Pei. Data Mining: Concepts And Techniques. 1st ed. Amsterdam: Elsevier/Morgan Kaufmann, 2012. Print.

  • Journal

    Hill, T. and Westbrook, R.

    SWOT analysis: It's time for a product recall

    1997 - Long Range Planning

    In-text: (Hill and Westbrook 46-52)

    Your Bibliography: Hill, Terry, and Roy Westbrook. "SWOT Analysis: It's Time For A Product Recall." Long Range Planning 30.1 (1997): 46-52. Web. 12 Nov. 2019.

  • Journal

    Huber, S., Wiemer, H., Schneider, D. and Ihlenfeldt, S.

    DMME: Data mining methodology for engineering applications – a holistic extension to the CRISP-DM model

    2019 - Procedia CIRP

    In-text: (Huber et al. 403-408)

    Your Bibliography: Huber, Steffen et al. "DMME: Data Mining Methodology For Engineering Applications – A Holistic Extension To The CRISP-DM Model." Procedia CIRP 79 (2019): 403-408. Web. 1 Jan. 2020.

  • Book

    Hunt, A.

    Your research project: How to manage it

    2005 - Routledge - London

    In-text: (Hunt)

    Your Bibliography: Hunt, Andy. Your Research Project: How To Manage It. London: Routledge, 2005. Print.

  • Report

    ID Experts

    2019 STUDY ON SOCIAL MEDIAPRIVACY AND SECURITY CONCERNS

    2019 - IDExpertsCorp.com

    In-text: (ID Experts)

    Your Bibliography: ID Experts. 2019 STUDY ON SOCIAL MEDIAPRIVACY AND SECURITY CONCERNS. IDExpertsCorp.com, 2019. Web. 9 Nov. 2019.

  • Journal

    Joslin, R. and Müller, R.

    Relationships between a project management methodology and project success in different project governance contexts

    2015 - International Journal of Project Management

    In-text: (Joslin and Müller 1377-1392)

    Your Bibliography: Joslin, Robert, and Ralf Müller. "Relationships Between A Project Management Methodology And Project Success In Different Project Governance Contexts." International Journal of Project Management 33.6 (2015): 1377-1392. Web.

  • Website

    Keras.io

    Text Preprocessing - Keras Documentation

    2020

    In-text: (Keras.io)

    Your Bibliography: Keras.io. "Text Preprocessing - Keras Documentation." Keras.io. N.p., 2020. Web. 20 Jan. 2020.

  • Report

    Khan, K., Turner, T. and Maqsood, T.

    Factors that influence the success of public sector projects in Pakistan

    2013

    In-text: (Khan, Turner and Maqsood 2-26)

    Your Bibliography: Khan, Khalid, Turner Turner, and Tayyab Maqsood. Factors That Influence The Success Of Public Sector Projects In Pakistan. 2013. Web. 8 Nov. 2019.

  • Journal

    Kneuper, R.

    Sixty Years of Software Development Life Cycle Models

    2017 - IEEE Annals of the History of Computing

    In-text: (Kneuper 41-54)

    Your Bibliography: Kneuper, Ralf. "Sixty Years Of Software Development Life Cycle Models." IEEE Annals of the History of Computing 39.3 (2017): 41-54. Web. 13 Nov. 2019.

  • Journal

    Kolter, J. Z. and Maloof, M. A.

    Learning to detect malicious executables in the wild

    2004 - Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '04

    In-text: (Kolter and Maloof 470–478)

    Your Bibliography: Kolter, Jeremy Z., and Marcus A. Maloof. "Learning To Detect Malicious Executables In The Wild." Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '04 (2004): 470–478. Web. 22 Jan. 2020.

  • Journal

    Kshetri, N. and Voas, J.

    Thoughts on Cyberbullying

    2019 - Computer

    In-text: (Kshetri and Voas 64-68)

    Your Bibliography: Kshetri, Nir, and Jeffrey Voas. "Thoughts On Cyberbullying." Computer 52.4 (2019): 64-68. Web. 25 Nov. 2019.

  • Book

    Kumar, R.

    Research methodology

    2011 - SAGE - Los Angeles

    In-text: (Kumar)

    Your Bibliography: Kumar, Ranjit. Research Methodology. 3rd ed. Los Angeles: SAGE, 2011. Print.

  • Journal

    Lee, Y., Chang, C., Lin, Y. and Cheng, Z.

    The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress

    2014 - Computers in Human Behavior

    In-text: (Lee et al. 373-383)

    Your Bibliography: Lee, Yu-Kang et al. "The Dark Side Of Smartphone Usage: Psychological Traits, Compulsive Behavior And Technostress." Computers in Human Behavior 31 (2014): 373-383. Web. 17 Nov. 2019.

  • Conference proceedings

    Lei Ba, J. and Kingma, D. P.

    Adam: A Method for Stochastic Optimization

    2015 - arXiv: Computing Research Repository (CoRR) - San Diego

    In-text: (Lei Ba and Kingma 1-15)

    Your Bibliography: Lei Ba, Jimmy, and Diederik P. Kingma. "Adam: A Method For Stochastic Optimization." 3Rd International Conference For Learning Representations. San Diego: arXiv: Computing Research Repository (CoRR), 2015. 1-15. Web. 10 Feb. 2020.

  • Book

    Lester, A.

    Project management, planning, and control

    2014 - Elsevier - Oxford

    In-text: (Lester)

    Your Bibliography: Lester, Albert. Project Management, Planning, And Control. 4th ed. Oxford: Elsevier, 2014. Print.

  • Book

    Lock, D.

    Project Management

    2018 - Routledge - New York

    In-text: (Lock)

    Your Bibliography: Lock, Dennis. Project Management. 8th ed. New York: Routledge, 2018. Print.

  • Book

    Lowe, S. D.

    Deep Learning For Dummies®, HPE Special Edition

    2018 - John Wiley & Sons, Inc. - Hoboken, NJ

    In-text: (Lowe)

    Your Bibliography: Lowe, Scott D. Deep Learning For Dummies®, HPE Special Edition. 1st ed. Hoboken, NJ: John Wiley & Sons, Inc., 2018. Print.

  • Book

    Lutz, M.

    Programming Python

    2011 - O'Reilly - Sebastopol, Calif.

    In-text: (Lutz 210)

    Your Bibliography: Lutz, Mark. Programming Python. 1st ed. Sebastopol, Calif.: O'Reilly, 2011. Print.

  • Journal

    Ma, J., Saul, L. K., Savage, S. and Voelker, G. M.

    Beyond blacklists

    2009 - Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '09

    In-text: (Ma et al.)

    Your Bibliography: Ma, Justin et al. "Beyond Blacklists." Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '09 (2009): n. pag. Web. 11 Nov. 2019.

  • Website

    Maheshwari, A.

    Report on Text Classification using CNN, RNN & HAN

    2018 - Medium

    In-text: (Maheshwari)

    Your Bibliography: Maheshwari, Akshat. "Report On Text Classification Using CNN, RNN & HAN." Medium. N.p., 2018. Web. 28 Dec. 2019.

  • Book

    McNeill., P.

    Research methods

    1990 - Routledge - London

    In-text: (McNeill.)

    Your Bibliography: McNeill., Patrick. Research Methods. 2nd ed. London: Routledge, 1990. Print.

  • Journal

    Milosevic, I. N.

    Practical Application of SWOT Analysis in the Management of a Construction Project

    2010 - Leadership and Management in Engineering

    In-text: (Milosevic 78-86)

    Your Bibliography: Milosevic, Igor N. "Practical Application Of SWOT Analysis In The Management Of A Construction Project." Leadership and Management in Engineering 10.2 (2010): 78-86. Web. 10 Nov. 2019.

  • Report

    Mitchell, T. M.

    The Discipline of Machine Learning

    2006 - Carnegie Mellon University - Pittsburgh

    In-text: (Mitchell 2-6)

    Your Bibliography: Mitchell, Tom M. The Discipline Of Machine Learning. Pittsburgh: Carnegie Mellon University, 2006. Web. 15 Dec. 2019.

  • Journal

    Mohd Selamat, S. A., Prakoonwit, S., Sahandi, R., Khan, W. and Ramachandran, M.

    Big data analytics-A review of data-mining models for small and medium enterprises in the transportation sector

    2018 - Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery

    In-text: (Mohd Selamat et al. 1-14)

    Your Bibliography: Mohd Selamat, Siti Aishah et al. "Big Data Analytics-A Review Of Data-Mining Models For Small And Medium Enterprises In The Transportation Sector." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 8.3 (2018): 1-14. Web. 1 Dec. 2019.

  • Book

    Mueller, J. and Massaron, L.

    Machine learning for dummies

    2016 - John Wiley & Sons, Inc - New Jersey

    In-text: (Mueller and Massaron 12-390)

    Your Bibliography: Mueller, John, and Luca Massaron. Machine Learning For Dummies. 1st ed. New Jersey: John Wiley & Sons, Inc, 2016. Print.

  • Journal

    Murnion, S., Buchanan, W. J., Smales, A. and Russell, G.

    Machine learning and semantic analysis of in-game chat for cyberbullying

    2018 - Computers & Security

    In-text: (Murnion et al. 197-213)

    Your Bibliography: Murnion, Shane et al. "Machine Learning And Semantic Analysis Of In-Game Chat For Cyberbullying." Computers & Security 76 (2018): 197-213. Web. 12 Dec. 2019.

  • Report

    Ofcom

    Adults’ Media Use and Attitudes Report

    2018 - Ofcom

    In-text: (Ofcom)

    Your Bibliography: Ofcom. Adults’ Media Use And Attitudes Report. Ofcom, 2018. Web. 28 Oct. 2019.

  • Report

    Ofcom

    Children and parents: Media use and attitudes report 2018

    2018 - Ofcom

    In-text: (Ofcom)

    Your Bibliography: Ofcom. Children And Parents: Media Use And Attitudes Report 2018. Ofcom, 2018. Web. 28 Oct. 2019.

  • Website

    Patchin, J.

    2016 Cyberbullying Data - Cyberbullying Research Center

    2016 - Cyberbullying Research Center

    In-text: (Patchin)

    Your Bibliography: Patchin, Justin. "2016 Cyberbullying Data - Cyberbullying Research Center." Cyberbullying Research Center. N.p., 2016. Web. 11 Nov. 2019.

  • Journal

    Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M. and Duchesnay, E.

    Scikit-learn: Machine learning in Python

    2011 - Journal of machine learning research

    In-text: (Pedregosa et al. 2825–2830)

    Your Bibliography: Pedregosa, Fabian et al. "Scikit-Learn: Machine Learning In Python." Journal of machine learning research 12.85 (2011): 2825–2830. Web. 28 Feb. 2020.

  • Report

    Pew Research Center

    Online Harassment 2017

    2017 - Pew Research Center

    In-text: (Pew Research Center)

    Your Bibliography: Pew Research Center. Online Harassment 2017. Pew Research Center, 2017. Web. 28 Oct. 2019.

  • Journal

    Pollard, C. E., Gupta, D. and Satzinger, J. W.

    Teaching Systems Development: A Compelling Case for Integrating the SDLC with the ITSM Lifecycle

    2010 - Information Systems Management

    In-text: (Pollard, Gupta and Satzinger 113-122)

    Your Bibliography: Pollard, Carol E., Dhiraj Gupta, and John W. Satzinger. "Teaching Systems Development: A Compelling Case For Integrating The SDLC With The ITSM Lifecycle." Information Systems Management 27.2 (2010): 113-122. Web. 14 Nov. 2019.

  • Book

    Raschka, S. and Mirjalili, V.

    Python machine learning

    2017 - Packt Publishing - Birmingham

    In-text: (Raschka and Mirjalili 20-800)

    Your Bibliography: Raschka, Sebastian, and Vahid Mirjalili. Python Machine Learning. 2nd ed. Birmingham: Packt Publishing, 2017. Print.

  • Journal

    Reynolds, K., Kontostathis, A. and Edwards, L.

    Using Machine Learning to Detect Cyberbullying

    2011 - 2011 10th International Conference on Machine Learning and Applications and Workshops

    In-text: (Reynolds, Kontostathis and Edwards)

    Your Bibliography: Reynolds, K., A. Kontostathis, and L. Edwards. "Using Machine Learning To Detect Cyberbullying." 2011 10th International Conference on Machine Learning and Applications and Workshops 2 (2011): n. pag. Web. 26 Feb. 2020.

  • Book

    Robson, C. and McCartan, K.

    Real World Research

    2016 - John Wiley & Sons

    In-text: (Robson and McCartan)

    Your Bibliography: Robson, Colin, and Kieran McCartan. Real World Research. 4th ed. John Wiley & Sons, 2016. Print.

  • Journal

    Sabella, R. A., Patchin, J. W. and Hinduja, S.

    Cyberbullying myths and realities

    2013 - Computers in Human Behavior

    In-text: (Sabella, Patchin and Hinduja 2703-2711)

    Your Bibliography: Sabella, Russell A., Justin W. Patchin, and Sameer Hinduja. "Cyberbullying Myths And Realities." Computers in Human Behavior 29.6 (2013): 2703-2711. Web. 17 Nov. 2019.

  • Journal

    Sabella, R. A., Patchin, J. W. and Hinduja, S.

    Cyberbullying myths and realities

    2013 - Computers in Human Behavior

    In-text: (Sabella, Patchin and Hinduja 2703-2711)

    Your Bibliography: Sabella, Russell A., Justin W. Patchin, and Sameer Hinduja. "Cyberbullying Myths And Realities." Computers in Human Behavior 29.6 (2013): 2703-2711. Web. 17 Nov. 2019.

  • Website

    SAS Institute

    Introduction to SEMMA

    2017 - SAS Institute

    In-text: (SAS Institute)

    Your Bibliography: SAS Institute. "Introduction To SEMMA." Documentation.sas.com. N.p., 2017. Web. 1 Dec. 2019.

  • Book

    Shalev-Shwartz, S. and Ben-David, S.

    Understanding machine learning

    2016 - Cambridge University Press - New York

    In-text: (Shalev-Shwartz and Ben-David)

    Your Bibliography: Shalev-Shwartz, Shai, and Shai Ben-David. Understanding Machine Learning. 1st ed. New York: Cambridge University Press, 2016. Print.

  • Journal

    Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N.

    Cyberbullying: its nature and impact in secondary school pupils

    2008 - Journal of Child Psychology and Psychiatry

    In-text: (Smith et al. 376-385)

    Your Bibliography: Smith, Peter K. et al. "Cyberbullying: Its Nature And Impact In Secondary School Pupils." Journal of Child Psychology and Psychiatry 49.4 (2008): 376-385. Web. 6 Dec. 2019.

  • Book

    Swamynathan, M.

    Mastering Machine Learning with Python in Six Steps

    2017 - Apress - Berkeley, CA

    In-text: (Swamynathan 1-350)

    Your Bibliography: Swamynathan, Manohar. Mastering Machine Learning With Python In Six Steps. 1st ed. Berkeley, CA: Apress, 2017. Print.

  • Website

    TensorFlow

    API Documentation  |  TensorFlow Core v2.2.0

    2020 - TensorFlow

    In-text: (TensorFlow)

    Your Bibliography: TensorFlow. "API Documentation  |  Tensorflow Core V2.2.0." TensorFlow. N.p., 2020. Web. 7 Feb. 2020.

  • Journal

    Thakur, K., Hayajneh, T. and Tseng, J.

    Cyber Security in Social Media: Challenges and the Way Forward

    2019 - IT Professional

    In-text: (Thakur, Hayajneh and Tseng 41-49)

    Your Bibliography: Thakur, Kutub, Thaier Hayajneh, and Jason Tseng. "Cyber Security In Social Media: Challenges And The Way Forward." IT Professional 21.2 (2019): 41-49. Web. 14 Nov. 2019.

  • Report

    Universities UK

    Tackling Online Harassment and Promoting Online Welfare

    2019 - Universities UK - London

    In-text: (Universities UK)

    Your Bibliography: Universities UK. Tackling Online Harassment And Promoting Online Welfare. London: Universities UK, 2019. Web. 28 Oct. 2019.

  • Book

    Walsh, M.

    Research Made Real: A guide for students

    2001 - Nelson Thornes - UK

    In-text: (Walsh 63-66)

    Your Bibliography: Walsh, Mark. Research Made Real: A Guide For Students. UK: Nelson Thornes, 2001. Print.

  • Book

    Watkins, J.

    Testing IT

    2010 - Cambridge University Press - Cambridge

    In-text: (Watkins)

    Your Bibliography: Watkins, John. Testing IT. 1st ed. Cambridge: Cambridge University Press, 2010. Print.

  • Journal

    Westerveld, E.

    The Project Excellence Model®: linking success criteria and critical success factors

    2003 - International Journal of Project Management

    In-text: (Westerveld 411-418)

    Your Bibliography: Westerveld, E. "The Project Excellence Model®: Linking Success Criteria And Critical Success Factors." International Journal of Project Management 21.6 (2003): 411-418. Web.

  • Govt. publication

    Wright, J. and Javid, S.

    Online Harms White Paper

    2019 - HM Government

    In-text: (Wright and Javid)

    Your Bibliography: Wright, Jerremy, and Sajid Javid. Online Harms White Paper. HM Government, 2019. Print.

  • Journal

    Zampieri, M., Malmasi, S., Nakov, P., Rosenthal, S., Farra, N. and Kumar, R.

    Predicting the Type and Target of Offensive Posts in Social Media

    2019 - Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL)

    In-text: (Zampieri et al.)

    Your Bibliography: Zampieri, Marcos et al. "Predicting The Type And Target Of Offensive Posts In Social Media." Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL) 1 (2019): n. pag. Web. 26 Feb. 2020.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join