Skip to main content

Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event Processing

Deliverables

External project website

External project website

World Summit for Counter-Terrorism Workshop

World Summit for Counter-Terrorism Workshop

LEA workshop reports

LEA workshop reports

Public wiki on relevant EU/national laws and regulations

Public wiki on relevant EU/national laws and regulations

LEA use case scenarios (public version)

LEA use case scenarios (public version)

Dissemination report

Dissemination report

Review of relevant EU/national laws and regulations

Review of relevant EU/national laws and regulations

Dissemination report update

Dissemination report update

Data privacy check-list

Data privacy check-list

Dissemination plan

Dissemination plan

Societal Impact Report

Societal Impact Report

Publications

A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

Author(s): Indranil Ghosh Ray, Yogachandran Rahulamathava, Muttukrishnan Rajarajan
Published in: IEEE Transactions on Cloud Computing, Issue March 2018, 2018, Page(s) 1-1, ISSN 2168-7161
DOI: 10.1109/TCC.2018.2820014

Phase space volume scaling of generalized entropies and anomalous diffusion scaling governed by corresponding non-linear Fokker-Planck equations

Author(s): Dániel Czégel, Sámuel G. Balogh, Péter Pollner, Gergely Palla
Published in: Scientific Reports, Issue 8/1, 2018, ISSN 2045-2322
DOI: 10.1038/s41598-018-20202-w

Fighting Terrorism: The Democracy Advantage

Author(s): Amichai Magen
Published in: Journal of Democracy, Issue 29/1, 2018, Page(s) 111-125, ISSN 1086-3214
DOI: 10.1353/jod.2018.0009

A Comprehensive Doctrine for an Evolving Threat: Countering Terrorist Use of Social Networks

Author(s): Eitan Azani, Nadine Liv
Published in: Studies in Conflict & Terrorism, Issue 09 Nov 2018, 2018, Page(s) 1-25, ISSN 1057-610X
DOI: 10.1080/1057610X.2018.1494874

Stability of glassy hierarchical networks

Author(s): M Zamani, L Camargo-Forero, T Vicsek
Published in: New Journal of Physics, Issue 20/2, 2018, Page(s) 023025, ISSN 1367-2630
DOI: 10.1088/1367-2630/aaa8ca

Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations

Author(s): Waqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan
Published in: 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018, Page(s) 329-334
DOI: 10.1109/SNPD.2018.8441144

Emergence of Leader-Follower Hierarchy Among Players in an On-Line Experiment

Author(s): Balint J. Toth, Gergely Palla, Enys Mones, Gergo Havadi, Nora Pall, Peter Pollner, Tamas Vicsek
Published in: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018, Page(s) 1184-1190
DOI: 10.1109/asonam.2018.8508278

Preference in the restructuring mechanisms of time evolving hierarchies

Author(s): Gergely Palla, Dániel Zagyva, Sámuel G. Balogh and Péter Pollner
Published in: COMPLEX NETWORKS 2018, 2018

A generalized class of thresholding functions for the hidden variable model of scale-free networks

Author(s): Gáspár Sámuel Balogh, Péter Pollner and Gergely Palla
Published in: COMPLEX NETWORKS 2018, 2018

Measuring the stability of complex hierarchical networks

Author(s): M Zamani and T Vicsek
Published in: The 6 th International Conference on Complex Networks & Their Applications, 2017

A Toolbox for Countering Extremist Religious Doctrines

Author(s): Shmuel Bar
Published in: RADICAL ISLAM ANTHOLOGY, 2018, Page(s) 34 37

Struggle Over Scripture: Charting the Rift Between Islamist Extremism and Mainstream Islam

Author(s): Milo Comerford, Rachel Bryson, IntuVIew (tech. input)
Published in: 2017