Online extremism detection in textual content: a systematic literature review

S Aldera, A Emam, M Al-Qurishi, M Alrubaian… - IEEE …, 2021 - ieeexplore.ieee.org
Social media networks such as Twitter, Facebook, YouTube, blogs, and discussion forums
are becoming powerful tools that extremist groups use to disseminate radical ideologies and …

Modelling to identify influential bloggers in the blogosphere: A survey

HU Khan, A Daud, U Ishfaq, T Amjad, N Aljohani… - Computers in Human …, 2017 - Elsevier
The user participatory nature of the social web has revolutionized the use of the
conventional web. The social web is an integral part of our daily life. Due to the resulting …

Depression intensity estimation via social media: A deep learning approach

S Ghosh, T Anwar - IEEE Transactions on Computational …, 2021 - ieeexplore.ieee.org
Depression has become a big problem in our society today. It is also a major reason for
suicide, especially among teenagers. In the current outbreak of coronavirus disease (COVID …

A hybrid approach for detecting automated spammers in twitter

M Fazil, M Abulaish - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Twitter is one of the most popular microblogging services, which is generally used to share
news and updates through short messages restricted to 280 characters. However, its open …

Key player identification in underground forums over attributed heterogeneous information network embedding framework

Y Zhang, Y Fan, Y Ye, L Zhao, C Shi - Proceedings of the 28th ACM …, 2019 - dl.acm.org
Online underground forums have been widely used by cybercriminals to exchange
knowledge and trade in illicit products or services, which have played a central role in the …

Torank: Identifying the most influential suspicious domains in the tor network

MW Al-Nabki, E Fidalgo, E Alegre… - Expert Systems with …, 2019 - Elsevier
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …

Modeling islamist extremist communications on social media using contextual dimensions: religion, ideology, and hate

U Kursuncu, M Gaur, C Castillo, A Alambo… - Proceedings of the …, 2019 - dl.acm.org
Terror attacks have been linked in part to online extremist content. Online conversations are
cloaked in religious ambiguity, with deceptive intentions, often twisted from mainstream …

Big data: issues, challenges, and techniques in business intelligence

MA Wani, S Jabin - Big Data Analytics: Proceedings of CSI 2015, 2018 - Springer
During the last decade, the most challenging problem the world envisaged was big data
problem. The big data problem means that data is growing at a much faster rate than …

BayesTrust and VehicleRank: Constructing an implicit Web of trust in VANET

Y Xiao, Y Liu - IEEE Transactions on Vehicular Technology, 2019 - ieeexplore.ieee.org
As Vehicular Ad hoc Network (VANET) features random topology and accommodates freely
connected nodes, it is important that the cooperation among the nodes exists. This paper …

Supervised ranking approach to identify infLuential websites in the darknet

MHDW Al Nabki, E Fidalgo, E Alegre, D Chaves - Applied Intelligence, 2023 - Springer
The anonymity and high security of the Tor network allow it to host a significant amount of
criminal activities. Some Tor domains attract more traffic than others, as they offer better …