Torank: Identifying the most influential suspicious domains in the tor network

MW Al-Nabki, E Fidalgo, E Alegre… - Expert Systems with …, 2019 - Elsevier
The Tor network hosts a significant amount of hidden services related to suspicious
activities. Law Enforcement Agencies need to monitor and to investigate crimes hidden …

The landscape of soft computing applications for terrorism analysis: a review

SR Srivastava, YK Meena, G Singh - Applied Soft Computing, 2021 - Elsevier
Terrorism is a globally prevalent dreaded form of crime against humanity in modern civil
society. The nature of surprise, casualties caused, and the panic involved in terrorist …

Identifying individuals associated with organized criminal networks: A social network analysis

K Basu, A Sen - Social Networks, 2021 - Elsevier
The past couple of decades has witnessed an unprecedented rise in organized crime. This
rise, coupled with increasing intricacies of organized crime, poses significant and evolving …

Assessing harmfulness and vulnerability in global bipartite networks of terrorist-target relationships

A Spelta, N Pecora, P Pagnottoni - Social Networks, 2023 - Elsevier
In this paper we leverage a massive attack-focused terrorist database and we design a
dynamic bipartite network analysis to examine the structural evolution of terrorists-targets …

Voltage stability assessment and identification of important nodes in power transmission network through network response structural characteristics

I Adebayo, AA Jimoh, A Yusuff - IET Generation, Transmission …, 2017 - Wiley Online Library
Electrical power grids are often susceptible to voltage instability and have been a growing
concern. In this study, the authors propose techniques based on network response structural …

Detection of terrorism-related twitter communities using centrality scores

I Gialampoukidis, G Kalpakis, T Tsikrika… - Proceedings of the 2nd …, 2017 - dl.acm.org
Social media are widely used among terrorists to communicate and disseminate their
activities. User-to-user interaction (eg mentions, follows) leads to the formation of complex …

Supervised ranking approach to identify infLuential websites in the darknet

MHDW Al Nabki, E Fidalgo, E Alegre, D Chaves - Applied Intelligence, 2023 - Springer
The anonymity and high security of the Tor network allow it to host a significant amount of
criminal activities. Some Tor domains attract more traffic than others, as they offer better …

Key player identification in terrorism-related social media networks using centrality measures

I Gialampoukidis, G Kalpakis, T Tsikrika… - 2016 European …, 2016 - ieeexplore.ieee.org
Monitoring terrorist groups and their suspicious activities in social media is a challenging
task, given the large amounts of data involved and the need to identify the most influential …

Identifying the leaders and main conspirators of the attacks in terrorist networks

AK Rai, S Kumar - ETRI Journal, 2022 - Wiley Online Library
This study proposes a novel method for identifying the primary conspirators involved in
terrorist activities. To map the information related to terrorist activities, we gathered …

Social internet of things using big data analytics and security aspects-a review

SD Arul, M Iyapparaja - Electronic Government, an …, 2020 - inderscienceonline.com
The rapid development of technologies in today's world has become interesting that made
millions of people to utilise the major advantages in it. Two main technologies that were …