Aliahmadi, A., Jafari-Eskandari, M., Mozafari, M., & Nozari, H. (2013). Comparing artificial neural networks and regression methods for predicting crude oil exports. International Journal of Information, Business and Management, 5(2), 40-58.
Ameri, H., Alizadeh, S., & Barzegari, A. (2013). Knowledge extraction from the data of diabetic patients using the decision tree method. Journal of Health Management, (53)16.
Bathaee, M., Nozari, H., & Szmelter-Jarosz, A. (2023). Designing a new location-allocation and routing model with simultaneous pick-up and delivery in a closed-loop supply chain network under uncertainty. Logistics, 7(1), 3.
Braha, D. (2013). Data mining for design and manufacturing: methods and applications. Springer Science & Business Media.
Chatzakou, D., Leontiadis, I., Blackburn, J., Cristofaro, E. D., Stringhini, G., Vakali, A., & Kourtellis, N. (2019). Detecting cyberbullying and cyberaggression in social media. ACM Transactions on the Web (TWEB), 13(3), 1-51.
Dastani, M., Mousavi Chalek, A., Ziyai, S., & Delghanadi, F. (2020). Thematic analysis of published articles of medical librarianship and information in Iran using text mining techniques. Health Image, 1(1), 10-15.
Gutiérrez-Esparza, G. O., Vallejo-Allende, M., & Hernández-Torruco, J. (2019). Classification of cyber-aggression cases applying machine learning. Applied Sciences, 9(9), 1828.
Hadi, R. M., Hashem, S. H., & Maolood, A. T. (2017). An effective preprocessing step algorithm in text mining application. Engineering and Technology Journal, 35(2B), 232-241.
Hematpoor, B., Mazaheri, A. M., & Mohseni, R. A. (2017). Detection and sociological explanation of violence against women in cyber space. Women's Research Journal, 8(4), 131-105.
Herodotou, H., Chatzakou, D., & Kourtellis, N. (2020). A streaming machine learning framework for online aggression detection on Twitter. In 2020 IEEE International Conference on Big Data (Big Data) (pp. 5056-5067). IEEE.
Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14(3), 206-221.
https://doi.org/10.1080/13811118.2010.494133
Holland, D., Ireland, J. L., & Muncer, S. (2009). Impulsivity, attribution and prison bullying: Bully-category and perpetrator–victim mutuality. International journal of law and psychiatry, 32(2), 84-91.
https://doi.org/10.10/j.ijlp.2009.01.00
Jafari, E., & Samadian, M.-a. (2012). The use of data mining in investigating the behavior of delinquent drivers in big cities. Traffic Studies Quarterly, 9(17), 14-35.
Lotfi, F. H. Z., Najafi, S. E., & Nozari, H. (Eds.). (2016). Data envelopment analysis and effective performance assessment. IGI Global.
Mandela, N., & Kennedy, J. F. (2018). Online harassment: bullying, stalking and trolling. In Internet Literacy Handbook.
Mehrani, K., Mirshahvalad, A., & Abbasi, E. (2019). Comparison of the Accuracy of Black Hole Algorithms and Gravitational Research and the Hybrid Method in Portfolio Optimization. International Journal of Finance & Managerial Accounting, 4(14), 111-126.
Mehrani, K., Mirshahvalad, A., & Abbasi, E. (2019). Portfolio optimization using black hole meta heuristic algorithm. specialty journal of accounting and economics, 5(2-2019), 1-13.
Moon, B., Hwang, H. W., & McCluskey, J. D. (2011). Causes of school bullying: Empirical test of a general theory of crime, differential association theory, and general strain theory. Crime & Delinquency, 57(6), 849-877.
Muneer, A., & Fati, S. M. (2020). A comparative analysis of machine learning techniques for cyberbullying detection on twitter. Future Internet, 12(11), 187.
Noori, S., Nourijelyani, K., & Mohammad, K. (2011). Random Forests Analysis: A modern statistical method for screening in high-dimensional studies and its application in a population-based genetic. Journal of North Khorasan University of Medical Sciences, 3, 49-57.
Nozari, H., & Ghahremani-Nahr, J. (2023). A Comprehensive Strategic-Tactical Multi-Objective Sustainable Supply Chain Model with Human Resources Considerations. Supply Chain Analytics, 4, 100044.
Nozari, H., Najafi, S. E., Jafari-Eskandari, M., & Aliahmadi, A. (2016). Providing a model for virtual project management with an emphasis on IT projects. In Project Management: Concepts, Methodologies, Tools, and Applications (pp. 476-496). IGI Global.
Rafiq, R. I., Hosseinmardi, H., Lv, R., Han, Q., & Mishra, S. (2018). Scalable and timely detection of cyberbullying in online social networks. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing (pp. 1738-1747). ACM.
Rahmaty, M., Daneshvar, A., Salahi, F., Ebrahimi, M., & Chobar, A. P. (2022). Customer churn modeling via the grey wolf optimizer and ensemble neural networks. Discrete Dynamics in Nature and Society, 2022(1), 9390768.
Saadollahi, A., & Najimeh, A. (2015). Data mining comparison of PSIRC methodology and RMEES methodology. In Proceedings of the Second International Research Conference in Science and Technology.
Saito, T., & Rehmsmeier, M. (2015). The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets. PloS one, 10(3), e0118432.
Sedehi, M., Mehrabi, Y., Kazemnejad, A., & Hadaegh, F. (2010). Comparison of artificial neural network, logistic regression and discriminant analysis methods in prediction of metabolic syndrome. Iranian Journal of Endocrinology and Metabolism, 11(4), 638-646.
Shafique, U., & Qaiser, H. (2014). A comparative study of data mining process models (KDD, CRISP-DM and SEMMA). International Journal of Innovation and Scientific Research, 12(1), 217-222.
Shin, S., Lee, S., & Kim, J. (2005). An application of support vector machines in bankruptcy prediction model. Expert Systems with Applications, 28(1), 127-135.
Singh, V., & Saini, B. (2014). An effective tokenization algorithm for information retrieval systems. Department of Computer Engineering, National Institute of Technology Kurukshetra, Haryana, India.
Singhal, P., & Bansal, A. (2013). Improved textual cyberbullying detection using data mining. International Journal of Information and Computation Technology, 3(6), 569-575.
Smith, P. K. (2012). Cyberbullying and cyber aggression. In Handbook of school violence and school safety (pp. 93-103). Routledge.
Taher, S. A., Akhter, K. A., & Hasan, K. A. (2018). N-gram based sentiment mining for Bangla text using support vector machine. In 2018 International Conference on Bangla Speech and Language Processing (ICBSLP) (pp. 1-5). IEEE.
Yao, M., Chelmis, C., & Zois, D. S. (2019, May). Cyberbullying ends here: Towards robust detection of cyberbullying in social media. In The World Wide Web Conference (pp. 3427-3433).
Ybarra, M. L., & Mitchell, K. J. (2007). Prevalence and frequency of Internet harassment instigation: Implications for adolescent health. Journal of Adolescent Health, 41(2), 189-195.