New Metrics for Dynamic Analysis of Online Radicalization
暂无分享,去创建一个
[1] Nancy C. Roberts,et al. Tracking and disrupting dark networks: Challenges of data collection and analysis , 2011, Inf. Syst. Frontiers.
[2] Sebastián A. Ríos,et al. Topic-based social network analysis for virtual communities of interests in the Dark Web , 2010, KDD 2010.
[3] Hsinchun Chen,et al. Analyzing and Visualizing Criminal Network Dynamics: A Case Study , 2004, ISI.
[4] Phyllis B. Gerstenfeld,et al. Hate Online: A Content Analysis of Extremist Internet Sites , 2003 .
[5] Hsinchun Chen,et al. The topology of dark networks , 2008, Commun. ACM.
[6] Santo Fortunato,et al. Community detection in graphs , 2009, ArXiv.
[7] Jennifer Jie Xu,et al. Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..
[8] Pooja Wadhwa and M. P. S. Bhatia. Classification of Radical Messages on Twitter Using Security Associations , 2014 .
[9] Richard M. Medina,et al. Social Network Analysis: A case study of the Islamist terrorist network , 2012, Security Journal.
[10] Sebastián A. Ríos,et al. Topic-based social network analysis for virtual communities of interests in the Dark Web , 2010, ISI-KDD '10.
[11] Alan F. Smeaton,et al. Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.
[12] Fatih Özgül,et al. Incorporating data sources and methodologies for crime data mining , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.
[13] Wang Jiaxin,et al. Investigative Data Mining: Identifying Key Nodes in Terrorist Networks , 2006, 2006 IEEE International Multitopic Conference.
[14] Robin Thompson,et al. Radicalization and the Use of Social Media , 2011 .
[15] Hsinchun Chen,et al. A multi-region empirical study on the internet presence of global extremist organizations , 2011, Inf. Syst. Frontiers.
[16] Pooja Wadhwa,et al. Tracking on-line radicalization using investigative data mining , 2013, 2013 National Conference on Communications (NCC).
[17] Abdul Rasool Qureshi,et al. Investigative data mining and its application in counterterrorism , 2005 .