[1] Micheline Kamber and Jian Pei Jiawei Han,” Data Mining Concepts and Techniques”, 2012, 3rd.
[2] Mohammed Abdul Khaled, Sateesh Kumar Pradhan and G.N. Dash,” Asurvey of data mining techniques on medical data for finding locally frequent diseases,”2013, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, pp. 149-153
[3] Abdur Razzak, "A questionnaire survey on infectious disease amonghospital patients in Kushtia and Jhenaidah, Bangladesh," 2011, International Journal of Genetics and Molecular Biology, vol. 3, no. 9, pp. 120-xxx
[4] D. P. Shukla, Shamsher Bahadur Patel and Ashish Kumar Sen, "Aliterature review in health informatics using data mining techniques," 2014, International Journal of Software & Hardware Research in Engineering, vol. 2, no. 2
[5] V. Gayathri, M.Chanda Mona and S.Banu Chitra, "A survey of datamining techniques on medical diagnosis and research," 2014, International Journal of Data Engineering (OOE) Singapore Journal of Scientific Research (SJSR), vol. 6, pp. 301-310
[6] Yasin N. Silva, Christopher Rich, Deborah Hall, “BullyBlocker: Towards the Identification of Cyber bullying in Social Networking Sites”, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
[7] Ana Kovaþeviü, “Cyber bullying detection using web content mining”, 22nd Telecommunications forum TELFOR 2014 Serbia, Belgrade, November 25-27, 2014
[8] Aishwarya Upadhyay, Akshay Chaudhari, Arunesh, Sarita Ghale, “Detection and Prevention measures for Cyber bullying and Online Grooming”, International Conference on Inventive Systems and Control (ICISC-2017)
[9] Charalampos Chelmis, Daphney–Stavroula Zois, Mengfan Yao, “Mining Patterns of Cyber bullying on Twitter”, 2017 IEEE International Conference on Data Mining Workshops
[10] Walisa Romsaiyud1 , Kodchakorn na Nakornphanom2 , Pimpaka Prasertsilp3 , Piyaporn Nurarak4 , Pirom Konglerd, “Automated Cyber bullying Detection using Clustering Appearance Patterns”, IEEE, 2017
[11] Aishwarya Upadhyay, Akshay Chaudhari, Arunesh, Sarita Ghale, “Detection and Prevention measures for Cyber bullying and Online Grooming”, International Conference on Inventive Systems and Control (ICISC-2017)
[12] Alanood Hamad Alduailej, Dr. Muhammad Badruddin Khan, “The challenge of cyber bullying and its automatic detection in Arabic text”, 2017 International Conference on Computer and Applications (ICCA)
[13] Semiu Salawu, Yulan He, and Joanna Lumsden, “Approaches to Automated Detection of Cyber bullying: A Survey”, IEEE, 2017
[14] Noviantho, Sani Muhamad Isa, Livia Ashianti, “Cyber bullying Classification using Text Mining”, 2017 1st International Conference on Informatics and Computational Sciences (ICICoS)
[15] I-Hsien Ting, Wun Sheng Liou, Dario Liberona, Shyue-Liang Wang, Giovanny Mauricio Tarazona Bermudez, “Towards the Detection of Cyber bullying Based on Social Network Mining Techniques”, IEEE, 2017
[16] Divyashree, Vinutha H, Deepashree N S, “International Journal of Innovative Research in Computer and Communication Engineering”, Vol. 4, Issue 4, April 2016.
[17] Vivek K. Singh, Qianjia Huang, Pradeep K. Atrey, “Cyber bullying Detection Using Probabilistic Socio-Textual Information Fusion”, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
[18] Cynthia Van Hee∗ , Els Lefever∗ , Ben Verhoeven† , Julie Mennes∗ , Bart Desme, “Automatic Detection and Prevention of Cyber bullying”, 2015.
[19] K. Nalini, Dr. L. Jaba Sheela, “A survey on Datamining in Cyber Bullying”, 2014, International Journal on Recent and Innovation Trends in Computing and Communication Volume: 2 Issue: 7
[20] Nektaria Potha, Manolis Maragoudakis, “Cyber bullying Detection using Time Series Modeling”, 2014 IEEE International Conference on Data Mining Workshop
[21] Qianjia Huang, Vivek K. Singh, Pradeep K. Atrey, “Cyber Bullying Detection Using Social and Textual Analysis”, IEEE, 2014
[22] Sourabh Parime, Vaibhav Suri, “Cyber bullying Detection and Prevention: Data Mining and Psychological Perspective”, 2014 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
[23] J.I.Sheeba, Dr.K.Vivekanandan, “Low Frequency Keyword Extraction with Sentiment Classification and Cyberbully Detection Using Fuzzy Logic Technique”, 2013 IEEE International Conference on Computational Intelligence and Computing Research
[24] Samaneh Nadali, Masrah Azrifah Azmi Murad, Nurfadhlina Mohamad Sharef, Aida Mustapha,Somayeh Shojaee, “A Review of Cyber bullying Detection: An Overview”, 2013 13th International Conference on Intellient Systems Design and Applications
[25] Tibor Bosse and Sven Stam, “A Normative Agent System to Prevent Cyber bullying”, 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology
[26] AI-Ajlan &Ykhlef, “A deep learning-based method to detect cyber bullying on Twitter” 2019 IEEE explore
[27] T. S. Sathyanarayana Rao, “Cyber bullying: A virtual offense with real consequences” 2018 Indian J Psychiatry
[28] Kyriakos Charalampous, Constantina Demetriou, Loukia Tricha, Myria Ioannou, Stelios Georgiou, Militsa Nikiforou, Panayiotis Stavrinides, “The effect of parental style on bullying and cyber bullying behaviors and the mediating role of peer attachment relationships:A longitudinal study”