Exploring extremism and terrorism on the web: The Dark Web project

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

In this paper we discuss technical issues regarding intelligence and security informatics (ISI) research to accomplish the critical missions of international security and counter-terrorism. We propose a research framework addressing the technical challenges facing counter-terrorism and crime-fighting applications with a primary focus on the knowledge discovery from databases (KDD) perspective. We also present several Dark Web related case studies for open-source terrorism information collection, analysis, and visualization. Using a web spidering approach, we have developed a large-scale, longitudinal collection of extremist-generated Internet-based multimedia and multilingual contents. We have also developed selected computational link analysis, content analysis, and authorship analysis techniques to analyze the Dark Web collection.

Original languageEnglish (US)
Title of host publicationIntelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Proceedings
Pages1-20
Number of pages20
StatePublished - 2007
Event2007 Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007 - Chengdu, China
Duration: Apr 11 2007Apr 12 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4430 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2007 Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007
Country/TerritoryChina
CityChengdu
Period4/11/074/12/07

Keywords

  • Dark web
  • Intelligence and security informatics
  • Terrorism informatics

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Exploring extremism and terrorism on the web: The Dark Web project'. Together they form a unique fingerprint.

Cite this