Skip to main content

Search form

Identification

You are here

Home

The Northern Virginia Military Shooting Series: Op ...

February 2013

This 2013 article examines the case of a Marine Corps reservist who perpetrated a series of attacks against military facilities in Virginia in October and November 2010.

Read more

The Emerging Technology of Predictive Analytics: I ...

2014

This 2014 article uses a case study method to examine the implications of using the emerging technology of predictive analytics in a homeland security context, to provide increased intelligence for counterterrorism initiatives.

Read more

Cooperative Game Theoretic Centrality Analysis of ...

2013

This 2013 paper introduces a methodology that incorporates information available on terrorist networks, into the analysis of social networks underlying terrorist groups.

Read more

Using SentiWordNet and Sentiment Analysis for Dete ...

2012

This 2012 paper presents a model that was built using sentiment analysis scores from analyzing selected web forums that included radical content. The study looked at two Arabic language web forums and extracted a sample of 500 sentences from each, which were then manually translated.

Read more

$1.00 per RT #BostonMarathon #PrayForBoston: Analy ...

2013

This 2013 article analyzes content generated on Twitter during the attacks at the Boston Marathon in April 2013. The authors perform an in-depth characterization of what factors influenced malicious content and profiles becoming viral.

Read more

Online Social Media in the Syria Conflict: Encompa ...

2014

This 2014 paper utilizes a form of network representation that incorporates multiple data views to uncover and categorize networks of accounts that fall into four broadly defined groups in the Syrian conflict.

Read more

Detecting Linguistic Markers for Radical Violence ...

December 2013

This article focuses on the use of linguistic “weak signals”—digital traces of intent—in social media as a tool of counterterrorism aimed at preventing lone-wolf attacks.

Read more

About us


This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism

MORE

Contact info

+1-613-755-4007 •  info@secdev.foundation

Copyright © 2014 - 2017 • The SecDev Foundation

  • Home
  • The SecDev Foundation