相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Deep Learning-based Text Classification: A Comprehensive Review
Shervin Minaee et al.
ACM COMPUTING SURVEYS (2022)
Automated Detection of Anti-National Textual Response to Terroristic Events on Online Media
Megha Chaudhary et al.
CYBERNETICS AND SYSTEMS (2022)
An Application of Natural Language Processing to Classify What Terrorists Say They Want
Raj Bridgelall
SOCIAL SCIENCES-BASEL (2022)
Aerodynamics Effect of Holes in UAV Wings Modified for VTOL Capability
Laith S. Sawaqed et al.
DRONE SYSTEMS AND APPLICATIONS (2022)
Leveraging machine learning in the global fight against money laundering and terrorism financing: An affordances perspective
Ana Isabel Canhoto
JOURNAL OF BUSINESS RESEARCH (2021)
Change Point Detection in Terrorism-Related Online Content Using Deep Learning Derived Indicators
Ourania Theodosiadou et al.
INFORMATION (2021)
A Review of the Research Progress of Social Network Structure
Ning Li et al.
COMPLEXITY (2021)
Systematic Literature Review to Investigate the Application of Open Source Intelligence (OSINT) with Artificial Intelligence
Joao Rafael Goncalves Evangelista et al.
JOURNAL OF APPLIED SECURITY RESEARCH (2021)
The Wane of Command: Evidence on Drone Strikes and Control within Terrorist Organizations
Anouk S. Rigterink
AMERICAN POLITICAL SCIENCE REVIEW (2021)
Prediction of Future Terrorist Activities Using Deep Neural Networks
M. Irfan Uddin et al.
COMPLEXITY (2020)
An XGBoost-based casualty prediction method for terrorist attacks
Yi Feng et al.
COMPLEX & INTELLIGENT SYSTEMS (2020)
Review of Text analysis Based on Deep Learning
Liu Ying et al.
2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020) (2020)
Auditing Radicalization Pathways on YouTube
Manoel Horta Ribeiro et al.
FAT* '20: PROCEEDINGS OF THE 2020 CONFERENCE ON FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY (2020)
A Neural Relation Extraction Model for Distant Supervision in Counter-Terrorism Scenario
Jiaqi Hou et al.
IEEE ACCESS (2020)
Incel (E)motives: Resentment, Shame and Revenge
Simon Cottee
STUDIES IN CONFLICT & TERRORISM (2020)
Human values and ideological beliefs as predictors of attitudes toward immigrants across 20 countries: The country-level moderating role of threat
Rafaella de C. R. Araujo et al.
EUROPEAN JOURNAL OF SOCIAL PSYCHOLOGY (2020)
The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends
Javier Pastor-Galindo et al.
IEEE ACCESS (2020)
Computational Mining of Social Media to Curb Terrorism
Mashael Almoqbel et al.
ACM COMPUTING SURVEYS (2019)
Crime base: Towards building a knowledge base for crime entities and their relationships from online news papers
K. Srinivasa et al.
INFORMATION PROCESSING & MANAGEMENT (2019)
Survey on supervised machine learning techniques for automatic text classification
Ammar Ismael Kadhim
ARTIFICIAL INTELLIGENCE REVIEW (2019)
A Comparative Study and Automated Detection of Illegal Weapon Procurement over Dark Web
Jaspal Kaur Saini et al.
CYBERNETICS AND SYSTEMS (2019)
A Survey of Event Extraction From Text
Wei Xiang et al.
IEEE ACCESS (2019)
Analyzing Right-wing YouTube Channels: Hate, Violence and Discrimination
Raphael Ottoni et al.
WEBSCI'18: PROCEEDINGS OF THE 10TH ACM CONFERENCE ON WEB SCIENCE (2018)
Intelligence and global health: assessing the role of open source and social media intelligence analysis in infectious disease outbreaks
Rose Bernard et al.
JOURNAL OF PUBLIC HEALTH-HEIDELBERG (2018)
Cluster Analysis of Pakistani Terrorism Events to Support Counterterrorism
Tariq Mahmood et al.
SOCIETIES (2018)
Emerging Trends Word2Vec
Kenneth Ward Church
NATURAL LANGUAGE ENGINEERING (2017)
Understanding the dynamics of terrorism events with multiple-discipline datasets and machine learning approach
Fangyu Ding et al.
PLOS ONE (2017)
An Outlier-Based Intention Detection for Discovering Terrorist Strategies
Salih Tutun et al.
COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS (2017)
Automating social network analysis: A power tool for counter-terrorism
Leslie Ball
SECURITY JOURNAL (2016)
Acquisition and Preparation of Data for OSINT Investigations
Helen Gibson
OPEN SOURCE INTELLIGENCE INVESTIGATION: FROM STRATEGY TO IMPLEMENTATION (2016)
TERRORISM INFORMATION EXTRACTION FROM ONLINE REPORTS
Sumali J. Conlon et al.
JOURNAL OF COMPUTER INFORMATION SYSTEMS (2015)
Sentiment-based Identification of Radical Authors (SIRA)
Ryan Scrivens et al.
2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW) (2015)
Text analysis for detecting terrorism-related articles on the web
Dongjin Choi et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)
Sentiment analysis algorithms and applications: A survey
Walaa Medhat et al.
AIN SHAMS ENGINEERING JOURNAL (2014)
Creating an educational context for Open Source Intelligence: The development of Internet self-efficacy through a blogcentric course
Yunhwan Kim et al.
COMPUTERS & EDUCATION (2013)
Behavioural aspects of terrorism
Samuel J. Leistedt
FORENSIC SCIENCE INTERNATIONAL (2013)
The language of Islamic extremism Towards an automated identification of beliefs, motivations and justifications
Sheryl Prentice et al.
INTERNATIONAL JOURNAL OF CORPUS LINGUISTICS (2012)
A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter
Marc Cheong et al.
INFORMATION SYSTEMS FRONTIERS (2011)
Tracking Terrorism News Threads by Extracting Event Signatures
Syed Toufeeq Ahmed et al.
ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (2009)
Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
Jialun Qin et al.
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2007)