Computational Mining of Social Media to Curb Terrorism

作者: Mashael Almoqbel , Songhua Xu

DOI: 10.1145/3342101

关键词:

摘要: In the ever-connected social networking era, terrorists exploit media platforms via sophisticated approaches. To curb these activities, a rich collection of computational methods was developed. This article surveys use by terrorists, followed temporal classification framework that overviews countermeasures at four major stages, including inception an attack, immediately before onset and after attack. The literature surveyed organized around stages. resulting survey is summarized in table with main technology used each stage based on time

参考文章(62)
Computational Methods for Counterterrorism communications and mobile computing. ,(2009) , 10.1007/978-3-642-01141-2
Simon Andrews, Simeon Yates, Babak Akhgar, David Fortune, The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation Strategic Intelligence Management#R##N#National Security Imperatives and Information and Communications Technologies. pp. 167- 180 ,(2013) , 10.1016/B978-0-12-407191-9.00014-4
Edouard Kujawski, Accounting for Terrorist Behavior in Allocating Defensive Counterterrorism Resources Systems Engineering. ,vol. 18, pp. 365- 376 ,(2015) , 10.1002/SYS.21309
Lingpeng Meng, Qi Kang, Chuanfeng Han, Weisheng Xu, Qidi Wu, A Game Theoretical Model for Location of Terror Response Facilities under Capacitated Resources The Scientific World Journal. ,vol. 2013, pp. 742845- 742845 ,(2013) , 10.1155/2013/742845
Aditi Gupta, Ponnurangam Kumaraguru, Credibility ranking of tweets during high impact events Proceedings of the 1st Workshop on Privacy and Security in Online Social Media. pp. 2- 8 ,(2012) , 10.1145/2185354.2185356
Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq, Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots internet measurement conference. pp. 129- 136 ,(2014) , 10.1145/2663716.2663729
Gary LaFree, Laura Dugan, Introducing the Global Terrorism Database Terrorism and Political Violence. ,vol. 19, pp. 181- 204 ,(2007) , 10.1080/09546550701246817
Herbert H. Tsang, Andrew J. Park, Mengting Sun, Uwe Glasser, GENIUS: A computational modeling framework for counter-terrorism planning and response intelligence and security informatics. pp. 71- 76 ,(2010) , 10.1109/ISI.2010.5484772