4.6 Review

Open source intelligence extraction for terrorism-related information: A review

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Theory & Methods

Deep Learning-based Text Classification: A Comprehensive Review

Shervin Minaee et al.

Summary: This article provides a comprehensive review of over 150 deep learning-based models for text classification developed in recent years. It discusses their technical contributions, similarities, and strengths, as well as summarizes popular datasets used for text classification. The article also includes a quantitative analysis of the performance of different deep learning models on popular benchmarks and discusses future research directions.

ACM COMPUTING SURVEYS (2022)

Article Computer Science, Cybernetics

Automated Detection of Anti-National Textual Response to Terroristic Events on Online Media

Megha Chaudhary et al.

Summary: The rise of the internet has led to the popularity of social media platforms where people can communicate and express their opinions on topics of interest. However, some individuals misuse these platforms to spread anti-national content, leading to hostility towards the country. This study aims to detect and monitor the presence of anti-national code-mixing text in comments on terrorism-related videos on YouTube using a novel deep-learning-based model.

CYBERNETICS AND SYSTEMS (2022)

Article Social Sciences, Interdisciplinary

An Application of Natural Language Processing to Classify What Terrorists Say They Want

Raj Bridgelall

Summary: This research applied natural language processing and machine learning techniques to analyze a comprehensive terrorism events database, extracting six categories of perpetrator aims and validating them using machine learning models. The results showed that the Extreme Gradient Boosting model had the best predictive performance. The identified aim categories can help the intelligence community understand the incentive structure of terrorist groups and customize strategies.

SOCIAL SCIENCES-BASEL (2022)

Article Remote Sensing

Aerodynamics Effect of Holes in UAV Wings Modified for VTOL Capability

Laith S. Sawaqed et al.

Summary: This research explores the possibility of modifying the X8 Skywalker from a fixed-wing unmanned aerial vehicle into a convertiplane. Computational fluid dynamics and wind tunnel experiments were conducted to analyze the performance of different wing configurations. The results indicate that the proposed modifications can generate enough lift despite reducing the wing area, with the filleted hole configuration demonstrating less drag and turbulence effects at low angles of attack.

DRONE SYSTEMS AND APPLICATIONS (2022)

Article Business

Leveraging machine learning in the global fight against money laundering and terrorism financing: An affordances perspective

Ana Isabel Canhoto

Summary: Financial services organizations around the world play a crucial role in facilitating money movement and monitoring clients' financial behavior for the prevention of money laundering. This paper investigates how machine learning algorithms can support these organizations in achieving their goals, highlighting the challenges of limited datasets for supervised learning but potential for reinforced and unsupervised learning in modeling unusual financial behavior.

JOURNAL OF BUSINESS RESEARCH (2021)

Article Computer Science, Information Systems

Change Point Detection in Terrorism-Related Online Content Using Deep Learning Derived Indicators

Ourania Theodosiadou et al.

Summary: This study introduces a framework to detect significant change points in terrorism-related time series, indicating potentially important events. The framework involves classifying textual data and analyzing change points in the generated time series to estimate statistically significant changes in structural behavior at certain time locations. Evaluation of the framework using a dataset related to jihadist forums shows promise, with topic detection on the estimated change points further assessing its effectiveness.

INFORMATION (2021)

Review Mathematics, Interdisciplinary Applications

A Review of the Research Progress of Social Network Structure

Ning Li et al.

Summary: Social network theory is an important paradigm in social structure research, which has been widely applied across various fields. By analyzing the structure of social networks and the origin and application of complex network models, this theory reveals deep social structures. While the theory has been extensively used in different areas, there is still a lack of research on multilevel structures, dynamic studies, and discussion network research.

COMPLEXITY (2021)

Review Criminology & Penology

Systematic Literature Review to Investigate the Application of Open Source Intelligence (OSINT) with Artificial Intelligence

Joao Rafael Goncalves Evangelista et al.

Summary: Open Source Intelligence (OSINT) is a concept used to describe the search, collection, analysis, and use of information from open sources, allowing for the discovery of specific information with knowledge or advantages. This study aims to fill the research gap in the application of OSINT with Artificial Intelligence (AI), presenting a systematic literature review consisting of 9 steps to support future OSINT studies.

JOURNAL OF APPLIED SECURITY RESEARCH (2021)

Article Political Science

The Wane of Command: Evidence on Drone Strikes and Control within Terrorist Organizations

Anouk S. Rigterink

Summary: This paper investigates the impact of counterterrorism targeting terrorist leaders on terrorist attacks. The results suggest that terrorist groups increase the number of attacks they commit after a drone hit on their leader, and principal-agent problems may better explain this phenomenon.

AMERICAN POLITICAL SCIENCE REVIEW (2021)

Article Mathematics, Interdisciplinary Applications

Prediction of Future Terrorist Activities Using Deep Neural Networks

M. Irfan Uddin et al.

COMPLEXITY (2020)

Article Computer Science, Artificial Intelligence

An XGBoost-based casualty prediction method for terrorist attacks

Yi Feng et al.

COMPLEX & INTELLIGENT SYSTEMS (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Review of Text analysis Based on Deep Learning

Liu Ying et al.

2020 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND HUMAN-COMPUTER INTERACTION (ICHCI 2020) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Auditing Radicalization Pathways on YouTube

Manoel Horta Ribeiro et al.

FAT* '20: PROCEEDINGS OF THE 2020 CONFERENCE ON FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY (2020)

Article Computer Science, Information Systems

A Neural Relation Extraction Model for Distant Supervision in Counter-Terrorism Scenario

Jiaqi Hou et al.

IEEE ACCESS (2020)

Article International Relations

Incel (E)motives: Resentment, Shame and Revenge

Simon Cottee

STUDIES IN CONFLICT & TERRORISM (2020)

Article Computer Science, Information Systems

The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends

Javier Pastor-Galindo et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Computational Mining of Social Media to Curb Terrorism

Mashael Almoqbel et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

Crime base: Towards building a knowledge base for crime entities and their relationships from online news papers

K. Srinivasa et al.

INFORMATION PROCESSING & MANAGEMENT (2019)

Article Computer Science, Artificial Intelligence

Survey on supervised machine learning techniques for automatic text classification

Ammar Ismael Kadhim

ARTIFICIAL INTELLIGENCE REVIEW (2019)

Article Computer Science, Cybernetics

A Comparative Study and Automated Detection of Illegal Weapon Procurement over Dark Web

Jaspal Kaur Saini et al.

CYBERNETICS AND SYSTEMS (2019)

Article Computer Science, Information Systems

A Survey of Event Extraction From Text

Wei Xiang et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

Analyzing Right-wing YouTube Channels: Hate, Violence and Discrimination

Raphael Ottoni et al.

WEBSCI'18: PROCEEDINGS OF THE 10TH ACM CONFERENCE ON WEB SCIENCE (2018)

Article Public, Environmental & Occupational Health

Intelligence and global health: assessing the role of open source and social media intelligence analysis in infectious disease outbreaks

Rose Bernard et al.

JOURNAL OF PUBLIC HEALTH-HEIDELBERG (2018)

Article Computer Science, Artificial Intelligence

Emerging Trends Word2Vec

Kenneth Ward Church

NATURAL LANGUAGE ENGINEERING (2017)

Proceedings Paper Computer Science, Artificial Intelligence

An Outlier-Based Intention Detection for Discovering Terrorist Strategies

Salih Tutun et al.

COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS (2017)

Article Criminology & Penology

Automating social network analysis: A power tool for counter-terrorism

Leslie Ball

SECURITY JOURNAL (2016)

Article Criminology & Penology

Acquisition and Preparation of Data for OSINT Investigations

Helen Gibson

OPEN SOURCE INTELLIGENCE INVESTIGATION: FROM STRATEGY TO IMPLEMENTATION (2016)

Article Computer Science, Information Systems

TERRORISM INFORMATION EXTRACTION FROM ONLINE REPORTS

Sumali J. Conlon et al.

JOURNAL OF COMPUTER INFORMATION SYSTEMS (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Sentiment-based Identification of Radical Authors (SIRA)

Ryan Scrivens et al.

2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW) (2015)

Article Computer Science, Hardware & Architecture

Text analysis for detecting terrorism-related articles on the web

Dongjin Choi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Engineering, Multidisciplinary

Sentiment analysis algorithms and applications: A survey

Walaa Medhat et al.

AIN SHAMS ENGINEERING JOURNAL (2014)

Article Computer Science, Interdisciplinary Applications

Creating an educational context for Open Source Intelligence: The development of Internet self-efficacy through a blogcentric course

Yunhwan Kim et al.

COMPUTERS & EDUCATION (2013)

Review Medicine, Legal

Behavioural aspects of terrorism

Samuel J. Leistedt

FORENSIC SCIENCE INTERNATIONAL (2013)

Article Linguistics

The language of Islamic extremism Towards an automated identification of beliefs, motivations and justifications

Sheryl Prentice et al.

INTERNATIONAL JOURNAL OF CORPUS LINGUISTICS (2012)

Proceedings Paper Computer Science, Theory & Methods

Tracking Terrorism News Threads by Extracting Event Signatures

Syed Toufeeq Ahmed et al.

ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (2009)

Article Computer Science, Cybernetics

Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity

Jialun Qin et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2007)