Data-driven system identification of the social network dynamics in online postings of an extremist group

AR Diaz, J Choi, TJ Holt, S Chermak… - … on Cybercrime and …, 2016 - ieeexplore.ieee.org
Terrorism research has begun to focus on the issue of radicalization, or the acceptance of
ideological belief systems that lead toward violence. There has been particular attention …

Tracking on-line radicalization using investigative data mining

P Wadhwa, MPS Bhatia - 2013 National Conference on …, 2013 - ieeexplore.ieee.org
The increasing complexity and emergence of Web 2.0 applications have paved way for
threats arising out of the use of social networks by cyber extremists (Radical groups) …

An approach for dynamic identification of online radicalization in social networks

P Wadhwa, MPS Bhatia - Cybernetics and Systems, 2015 - Taylor & Francis
The Online Social Network (OSN) has evolved as a popular platform enabling rich topic-
centric interactions and serving as a medium to facilitate online radicalization (Behr et al.) …

Temporal analysis of radical dark web forum users

AJ Park, B Beck, D Fletche, P Lam… - 2016 IEEE/ACM …, 2016 - ieeexplore.ieee.org
Extremist groups have turned to the Internet and social media sites as a means of sharing
information amongst one another. This research study analyzes forum posts and finds …

New metrics for dynamic analysis of online radicalization

P Wadhwa, MPS Bhatia - Journal of Applied Security Research, 2016 - Taylor & Francis
The increasing use of online social networks (OSNs) by extremists for the spread of
radicalization have been a great concern for law enforcement agencies across the world …

Bot-ivistm: assessing information manipulation in social media using network analytics

MC Benigni, K Joseph, KM Carley - Emerging research challenges and …, 2019 - Springer
Social influence bot networks are used to effect discussions in social media. While
traditional social network methods have been used in assessing social media data, they are …

Identifying key-players in online activist groups on the Facebook social network

M Nouh, JRC Nurse - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
Online social media applications have become an integral part of our everyday life. Not only
are they being utilised by individuals and legitimate businesses, but also recently several …

Detecting the hidden dynamics of networked actors using temporal correlations

K Erhardt, D Albassam - Companion Proceedings of the ACM Web …, 2023 - dl.acm.org
Influence campaigns pose a threat to fact-based reasoning, erode trust in institutions, and
tear at the fabric of our society. In the 21st century, influence campaigns have rapidly …

[PDF][PDF] Automatic Detection and Forecasting of Violent Extremist Cyber-Recruitment

JR Scanlon - 2014 - voxpol.eu
Growing use of the Internet as a major means of communication has led to the formation of
cyber-communities, which have become increasingly appealing to violent extremists due to …

Online activity traces around a" Boston bomber"

A Semenov, A Nikolaev, J Veijalainen - Proceedings of the 2013 IEEE …, 2013 - dl.acm.org
This paper describes traces of user activity around a alleged online social network profile of
a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data …