4.7 Article

Computational Mining of Social Media to Curb Terrorism

期刊

ACM COMPUTING SURVEYS
卷 52, 期 5, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3342101

关键词

Terrorism; social media mining; computational analytics; counterterrorism

向作者/读者索取更多资源

In the ever-connected social networking era, terrorists exploit social media platforms via sophisticated approaches. To curb these activities, a rich collection of computational methods was developed. This article surveys the use of social media by terrorists, followed by a temporal classification framework that overviews computational countermeasures at four major stages, including inception of an attack, immediately before an attack, onset of an attack, and after an attack. The literature surveyed was organized around the four temporal stages. The resulting survey is summarized in a table with the main technology used in each stage based on the time of the attack.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据