This 2013 paper introduces a methodology that incorporates information available on terrorist networks, into the analysis of social networks underlying terrorist groups.
This 2013 article analyzes content generated on Twitter during the attacks at the Boston Marathon in April 2013. The authors perform an in-depth characterization of what factors influenced malicious content and profiles becoming viral.
This article studied a selection of right-wing extremist (RWE) groups on Twitter. The authors looked at particular language-based networks as case studies, collecting Twitter data for groups across eight countries.
This 2012 article focuses on Social Network Analysis (SNA) and particularly the challenge of identifying central nodes within a given social network. The authors propose a new centrality measure for weighted networks based on the amoeboid algorithm, which is called Physarum centrality.
This 2010 post focuses on the distance between nodes within social networks and particularly those with disconnected components. Key node centrality is defined by the author as the inverse of farness, and in turn, the sum of distances to all other nodes within a given network structure.
This article focuses on Data Mining and Social Network Analysis (SNA) amongst bloggers, and in particular the mining of racist groups and cyber hate communities in online blogging websites.
This 2014 article focuses on some of the key issues that exist in current research on network theory and Social Network Analysis (SNA).
This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism
+1-613-755-4007 • info@secdev.foundation
Copyright © 2014 - 2017 • The SecDev Foundation