This paper focuses on social network analysis (SNA) for the purposes of community detection using a hybrid graph-based tag clustering scheme (HGC). The authors present a novel scheme for graph-based clustering with the goal of identifying groups of related tags in folksonomies.
This article outlines a semi-automated approach for analyzing the content and structure of online hate groups active on blogging platforms.
This 2013 article focuses on identifying and measuring the influence of extremist accounts on Twitter, assessing extremist content, and determining ways to counter violent extremism (CVE) in online social networks.
This article focuses on the problem of identifying influential Twitter users using Machine Learning (ML) techniques and Natural Language Processing (NLP).
This seminal 1991 article examines the strategic applications of network analysis methodologies for law enforcement.
This 2014 paper presents a web-crawler called the Terrorism and Extremism Network Extractor (TENE), designed to gather information about extremist activities on the Internet.
This 2013 book aims to inform government decision-makers, security analysts, and activists on how to use the social world to improve security locally, nationally, globally, and cost-effectively.
This 2013 paper introduces a methodology that incorporates information available on terrorist networks, into the analysis of social networks underlying terrorist groups.
This 2013 paper focuses on the modelling of terrorist networks online and addresses changes in technology and the associated creation of new security dynamics and threats.
This 2014 report by the International Centre for the Study of Radicalization and Political Violence (ICSR) presents the findings of a 12-month study on the social media profiles of 190 Western and European foreign fighters.
This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism
+1-613-755-4007 • info@secdev.foundation
Copyright © 2014 - 2017 • The SecDev Foundation