The high volume of extremist materials online makes manual classification impractical. However, there is a need for automated classification techniques. One set of extremist web pages obtained by the TENE Web-crawler was initially subjected to manual classification. A sentiment-based classification model was then developed to automate the classification of such extremist Websites. The classification model measures how well the pages could be automatically matched against their appropriate classes. The method also identifies particular data items that differ in manual classification from their automated classification. The results from our method showed that overall web pages were correctly matched against the manual classification with a 93...
This paper is part of the research on creating semantic analysis models in web resources for definin...
Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grims...
The role of intelligence and security informatics based on statistical computations is becoming more...
The spread of terrorism and extremism activities on the Internet has created the need for intelligen...
Webpages with terrorist and extremist content are key factors in the recruitment and radicalization ...
The Internet has become an essential part of modern communication. People are sharing ideas, thought...
The article explores various models and methods employed in classifying text content with the aim of...
The role of intelligence and security informatics based on statistical computations is becoming more...
Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber-Hate) is wi...
Abstract-Terrorists and extremists are increasingly utilizing Internet technology as an effective mo...
The threat of terrorism, both foreign and domestic, is a growing threat to the Western world. Counte...
The use of Web sites by terrorist groups has been evident since the mid 1990s. Security experts and ...
The Internet is rife with abuse: examples include spam, phishing, malicious advertising, DNS abuse,...
Terror attacks have been linked in part to online extremist content. Online conversations are cloake...
Public opinion is among the critical types of information that often inform policy changes and polit...
This paper is part of the research on creating semantic analysis models in web resources for definin...
Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grims...
The role of intelligence and security informatics based on statistical computations is becoming more...
The spread of terrorism and extremism activities on the Internet has created the need for intelligen...
Webpages with terrorist and extremist content are key factors in the recruitment and radicalization ...
The Internet has become an essential part of modern communication. People are sharing ideas, thought...
The article explores various models and methods employed in classifying text content with the aim of...
The role of intelligence and security informatics based on statistical computations is becoming more...
Online Radicalization (also called Cyber-Terrorism or Extremism or Cyber-Racism or Cyber-Hate) is wi...
Abstract-Terrorists and extremists are increasingly utilizing Internet technology as an effective mo...
The threat of terrorism, both foreign and domestic, is a growing threat to the Western world. Counte...
The use of Web sites by terrorist groups has been evident since the mid 1990s. Security experts and ...
The Internet is rife with abuse: examples include spam, phishing, malicious advertising, DNS abuse,...
Terror attacks have been linked in part to online extremist content. Online conversations are cloake...
Public opinion is among the critical types of information that often inform policy changes and polit...
This paper is part of the research on creating semantic analysis models in web resources for definin...
Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grims...
The role of intelligence and security informatics based on statistical computations is becoming more...