Skip to main content

Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event Processing


LEA use case scenarios (public version)

LEA use case scenarios (public version)

Review of relevant EU/national laws and regulations

Review of relevant EU/national laws and regulations

Dissemination report update

Dissemination report update

Data privacy check-list

Data privacy check-list

Dissemination plan

Dissemination plan

Searching for OpenAIRE data...


A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

Author(s): Indranil Ghosh Ray, Yogachandran Rahulamathava, Muttukrishnan Rajarajan
Published in: IEEE Transactions on Cloud Computing, Issue March 2018, 2018, Page(s) 1-1, ISSN 2168-7161
DOI: 10.1109/TCC.2018.2820014

Phase space volume scaling of generalized entropies and anomalous diffusion scaling governed by corresponding non-linear Fokker-Planck equations

Author(s): Dániel Czégel, Sámuel G. Balogh, Péter Pollner, Gergely Palla
Published in: Scientific Reports, Issue 8/1, 2018, ISSN 2045-2322
DOI: 10.1038/s41598-018-20202-w

Fighting Terrorism: The Democracy Advantage

Author(s): Amichai Magen
Published in: Journal of Democracy, Issue 29/1, 2018, Page(s) 111-125, ISSN 1086-3214
DOI: 10.1353/jod.2018.0009

A Comprehensive Doctrine for an Evolving Threat: Countering Terrorist Use of Social Networks

Published in: ISSN 1057-610X
DOI: 10.1080/1057610X.2018.1494874

Stability of glassy hierarchical networks

Author(s): M Zamani, L Camargo-Forero, T Vicsek
Published in: New Journal of Physics, Issue 20/2, 2018, Page(s) 023025, ISSN 1367-2630
DOI: 10.1088/1367-2630/aaa8ca

Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations

Author(s): Waqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan
Published in: 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018, Page(s) 329-334
DOI: 10.1109/SNPD.2018.8441144

Emergence of Leader-Follower Hierarchy Among Players in an On-Line Experiment

Author(s): Balint J. Toth, Gergely Palla, Enys Mones, Gergo Havadi, Nora Pall, Peter Pollner, Tamas Vicsek
Published in: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018, Page(s) 1184-1190
DOI: 10.1109/asonam.2018.8508278

Preference in the restructuring mechanisms of time evolving hierarchies

Author(s): Gergely Palla, Dániel Zagyva, Sámuel G. Balogh and Péter Pollner
Published in: COMPLEX NETWORKS 2018, 2018

A generalized class of thresholding functions for the hidden variable model of scale-free networks

Author(s): Gáspár Sámuel Balogh, Péter Pollner and Gergely Palla
Published in: COMPLEX NETWORKS 2018, 2018

Measuring the stability of complex hierarchical networks

A Toolbox for Countering Extremist Religious Doctrines

Author(s): Shmuel Bar
Published in: RADICAL ISLAM ANTHOLOGY, 2018, Page(s) 34 37

Struggle Over Scripture: Charting the Rift Between Islamist Extremism and Mainstream Islam

Author(s): Milo Comerford, Rachel Bryson, IntuVIew (tech. input)
Published in: 2017