Online extremism detection: A systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools

M Gaikwad, S Ahirrao, S Phansalkar, K Kotecha - Ieee Access, 2021 - ieeexplore.ieee.org
Social media platforms are popular for expressing personal views, emotions and beliefs.
Social media platforms are influential for propagating extremist ideologies for group …

Risk and threat assessment instruments for violent extremism: A systematic review.

A Clesle, J Knäble, M Rettenberger - Journal of Threat Assessment …, 2024 - psycnet.apa.org
Frontline law enforcement, police, and security personnel of various backgrounds have the
challenging task to identify extremists who have a high risk for committing violent acts …

Improved phishing detection algorithms using adversarial autoencoder synthesized data

H Shirazi, SR Muramudalige, I Ray… - 2020 ieee 45th …, 2020 - ieeexplore.ieee.org
Malicious actors often use phishing attacks to compromise legitimate users' credentials.
Machine learning is a promising approach for phishing detection. While the accuracy of …

Adversarial autoencoder data synthesis for enhancing machine learning-based phishing detection algorithms

H Shirazi, SR Muramudalige, I Ray… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Supervised machine learning is often used to detect phishing websites. However, the
scarcity of phishing data for training purposes limits the classifier's performance. Further …

ChildProtect: A parental control application for tracking hostile surfing content

H Ameur, A Rekik, S Jamoussi, AB Hamadou - Entertainment Computing, 2023 - Elsevier
The emergence of the Internet and social media has provided a ground conducive to the
rapid development of violent ideas and online malicious behavior, and even to rising the …

Finding emergent patterns of behaviors in dynamic heterogeneous social networks

BWK Hung, AP Jayasumana… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The search in graph databases for individuals or entities undertaking latent or emergent
behaviors has applicability in the areas of homeland security, consumer analytics …

Applying unsupervised machine learning to counterterrorism

R Bridgelall - Journal of Computational Social Science, 2022 - Springer
To advance the agenda in counterterrorism, this work demonstrates how analysts can
combine unsupervised machine learning, exploratory data analysis, and statistical tests to …

A Comprehensive Survey of Detection and Prevention Approaches for Online Radicalization: Identifying Gaps and Future Directions

O Berjawi, G Fenza, V Loia - IEEE Access, 2023 - ieeexplore.ieee.org
In the digital era, online radicalization has emerged as a significant concern for
governments, social media platforms, and researchers. Detecting and preventing online …

Recognizing radicalization indicators in text documents using human-in-the-loop information extraction and nlp techniques

BWK Hung, SR Muramudalige… - … on technologies for …, 2019 - ieeexplore.ieee.org
Among the operational shortfalls that hinder law enforcement from achieving greater
success in preventing terrorist attacks is the difficulty in dynamically assessing individualized …

On sampling and recovery of topology of directed social networks–a low-rank matrix completion based approach

G Mahindre, AP Jayasumana… - 2019 IEEE 44th …, 2019 - ieeexplore.ieee.org
Extracting connectivity information in massive social networks is important for many
applications. Algorithms developed for undirected networks cannot be used with social …