The spread of terrorism and extremism activities on the Internet has created the need for intelligence gathering via Web and real-time monitoring of potential websites for extremist activities. However, the manual classification for such contents is practically difficult and time-consuming. In response to this challenge, an automated classification system called Composite technique was developed. This is a computational framework that explores the combination of both semantics and syntactic features of textual contents of a Web page. We implemented the framework on a set of extremist Web pages - a dataset that has been subjected to a manual classification process. Thereby, we developed a classification model on the data using the J48 decisi...
This paper is part of the research on creating semantic analysis models in web resources for definin...
Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber-Hate) is wi...
Public opinion is among the critical types of information that often inform policy changes and polit...
The high volume of extremist materials online makes manual classification impractical. However, ther...
Webpages with terrorist and extremist content are key factors in the recruitment and radicalization ...
The role of intelligence and security informatics based on statistical computations is becoming more...
The role of intelligence and security informatics based on statistical computations is becoming more...
Radical content in procedural meaning is content which have provoke the violence, spread the hatred ...
Nowadays, terrorist organizations have found a cost-effective resource to advance their courses by p...
The article explores various models and methods employed in classifying text content with the aim of...
The Internet has become an essential part of modern communication. People are sharing ideas, thought...
Abstract-Terrorists and extremists are increasingly utilizing Internet technology as an effective mo...
The Internet is rife with abuse: examples include spam, phishing, malicious advertising, DNS abuse,...
Reissued 30 May 2017 with Second Reader’s non-NPS affiliation added to title page.Online propaganda ...
The threat of terrorism, both foreign and domestic, is a growing threat to the Western world. Counte...
This paper is part of the research on creating semantic analysis models in web resources for definin...
Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber-Hate) is wi...
Public opinion is among the critical types of information that often inform policy changes and polit...
The high volume of extremist materials online makes manual classification impractical. However, ther...
Webpages with terrorist and extremist content are key factors in the recruitment and radicalization ...
The role of intelligence and security informatics based on statistical computations is becoming more...
The role of intelligence and security informatics based on statistical computations is becoming more...
Radical content in procedural meaning is content which have provoke the violence, spread the hatred ...
Nowadays, terrorist organizations have found a cost-effective resource to advance their courses by p...
The article explores various models and methods employed in classifying text content with the aim of...
The Internet has become an essential part of modern communication. People are sharing ideas, thought...
Abstract-Terrorists and extremists are increasingly utilizing Internet technology as an effective mo...
The Internet is rife with abuse: examples include spam, phishing, malicious advertising, DNS abuse,...
Reissued 30 May 2017 with Second Reader’s non-NPS affiliation added to title page.Online propaganda ...
The threat of terrorism, both foreign and domestic, is a growing threat to the Western world. Counte...
This paper is part of the research on creating semantic analysis models in web resources for definin...
Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber-Hate) is wi...
Public opinion is among the critical types of information that often inform policy changes and polit...