Preliminary analytical considerations in designing a terrorism and extremism online network extractor

M Bouchard, K Joffres, R Frank - Computational models of complex …, 2014 - Springer
It is now widely understood that extremists use the Internet in attempts to accomplish many
of their objectives. In this chapter we present a web-crawler called the Terrorism and …

On the topology of the dark web of terrorist groups

J Xu, H Chen, Y Zhou, J Qin - … on Intelligence and Security Informatics, ISI …, 2006 - Springer
In recent years, terrorist groups have used the WWW to spread their ideologies, disseminate
propaganda, and recruit members. Studying the terrorist websites may help us understand …

Collecting and analyzing the presence of terrorists on the web: A case study of jihad websites

E Reid, J Qin, Y Zhou, G Lai, M Sageman… - Intelligence and Security …, 2005 - Springer
The Internet which has enabled global businesses to flourish has become the very same
channel for mushrooming 'terrorist news networks.'Terrorist organizations and their …

US domestic extremist groups on the Web: link and content analysis

Y Zhou, E Reid, J Qin, H Chen, G Lai - IEEE intelligent systems, 2005 - ieeexplore.ieee.org
Although US domestic extremist and hate groups might not be as well-known as some
international groups, they nevertheless pose a significant threat to homeland security …

The dark web portal project: collecting and analyzing the presence of terrorist groups on the web

J Qin, Y Zhou, G Lai, E Reid, M Sageman… - Intelligence and Security …, 2005 - Springer
While the Web has evolved to be a global information platform for anyone to use, terrorists
are also using the Web to their own advantages. Many terrorist organizations and their …

Machine learning methods for detecting and monitoring extremist information on the internet

IV Mashechkin, MI Petrovskiy, DV Tsarev… - … and Computer Software, 2019 - Springer
In this paper, we employ machine learning methods to solve the problem of countering
terrorism and extremism by using information from the Internet. This problem involves …

[HTML][HTML] Introduction to special issue on terrorism informatics

H Chen, Y Zhou, EF Reid, CA Larson - Information systems frontiers, 2011 - Springer
Since September 11th, the multidisciplinary field of terrorism informatics has experienced
tremendous growth, and research communities as well as local, state, and national …

[图书][B] Terrorism informatics: Knowledge management and data mining for homeland security

H Chen, E Reid, J Sinai, A Silke, B Ganor - 2008 - books.google.com
Terrorism informatics has been defined as the application of advanced methodologies,
information fusion and analysis techniques to acquire, integrate process, analyze, and …

Exploring extremism and terrorism on the web: the dark web project

H Chen - Intelligence and Security Informatics: Pacific Asia …, 2007 - Springer
In this paper we discuss technical issues regarding intelligence and security informatics (ISI)
research to accomplish the critical missions of international security and counter-terrorism …

Detection of access to terror‐related Web sites using an Advanced Terror Detection System (ATDS)

Y Elovici, B Shapira, M Last, O Zaafrany… - Journal of the …, 2010 - Wiley Online Library
Terrorist groups use the Web as their infrastructure for various purposes. One example is the
forming of new local cells that may later become active and perform acts of terror. The …