作者: Mashael Almoqbel , Songhua Xu
DOI: 10.1145/3342101
关键词:
摘要: In the ever-connected social networking era, terrorists exploit media platforms via sophisticated approaches. To curb these activities, a rich collection of computational methods was developed. This article surveys use by terrorists, followed temporal classification framework that overviews countermeasures at four major stages, including inception an attack, immediately before onset and after attack. The literature surveyed organized around stages. resulting survey is summarized in table with main technology used each stage based on time