Skip to main content

Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event Processing

Deliverables

External project website

External project website

World Summit for Counter-Terrorism Workshop

World Summit for Counter-Terrorism Workshop

LEA workshop reports

LEA workshop reports

Public wiki on relevant EU/national laws and regulations

Public wiki on relevant EU/national laws and regulations

LEA use case scenarios (public version)

LEA use case scenarios (public version)

Dissemination report final

Dissemination report final

Pilot evaluation summary report (public)

Pilot evaluation summary report (public)

Dissemination report

Dissemination report

Review of relevant EU/national laws and regulations

Review of relevant EU/national laws and regulations

Dissemination report update

Dissemination report update

Business cases

Business cases

Data privacy check-list

Data privacy check-list

Ecosystem report

Ecosystem report

Collaboration report

Collaboration report

Dissemination plan

Dissemination plan

Societal Impact Report

Societal Impact Report

Searching for OpenAIRE data...

Publications

Efficient One-to-One Pair Matching for 2-D and 3-D Edge Detection Evaluation, VISAPP 2020

Author(s): Samuel Smith, Ian Williams
Published in: 15th International Conference on Computer Vision Theory and Applications, 2020, ISBN 978-989-758-402-2
Publisher: SCITEPRESS

Towards Unsupervised Image Harmonisation, VISAPP 2020

Author(s): Alan, Dolhasz, Carlo Harvey and Ian Williams
Published in: 15th International Conference on Computer Vision Theory and Applications, 2020, ISBN 978-989-758-402-2
Publisher: SCITEPRESS

Towards Fully Integrated Real-time Detection Framework for Online Contents Analysis - RED-Alert Approach

Author(s): Syed Naqvi, Ian Williams, Sean Enderby, Peter Pollner, Daniel Abel, Berta Biescas, Oscar Garcia, Monica Florea, Cristi Potlog
Published in: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2019, Page(s) 257-263, ISBN 978-1-7281-3026-2
Publisher: IEEE
DOI: 10.1109/eurospw.2019.00035

Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities

Author(s): Naqvi, S. and Enderby, S. and Williams, I. and Asif W. and Rajarajan, M. and Potlog, C. and Florea, M.
Published in: 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2019
Publisher: BCU Open Access Repository

Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations

Author(s): Waqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan
Published in: 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018, Page(s) 329-334, ISBN 978-1-5386-5889-5
Publisher: IEEE
DOI: 10.1109/SNPD.2018.8441144

Emergence of Leader-Follower Hierarchy Among Players in an On-Line Experiment

Author(s): Balint J. Toth, Gergely Palla, Enys Mones, Gergo Havadi, Nora Pall, Peter Pollner, Tamas Vicsek
Published in: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018, Page(s) 1184-1190, ISBN 978-1-5386-6051-5
Publisher: IEEE
DOI: 10.1109/asonam.2018.8508278

Preference in the restructuring mechanisms of time evolving hierarchies

Author(s): Gergely Palla, Dániel Zagyva, Sámuel G. Balogh and Péter Pollner
Published in: COMPLEX NETWORKS 2018, 2018, ISBN 978-2-9557050-2-5
Publisher: .

A generalized class of thresholding functions for the hidden variable model of scale-free networks

Author(s): Gáspár Sámuel Balogh, Péter Pollner and Gergely Palla
Published in: COMPLEX NETWORKS 2018, 2018, ISBN 978-2-9557050-2-5
Publisher: .

Measuring the stability of complex hierarchical networks

Author(s): M Zamani and T Vicsek
Published in: The 6 th International Conference on Complex Networks & Their Applications, 2017, ISBN 978-2-9557050-2-5
Publisher: .

Differences in structure and dynamics of networks retrieved from dark and public web forums

Author(s): Maryam Zamani, Fereshteh Rabbani, Attila Horicsányi, Anna Zafeiris, Tamas Vicsek
Published in: Physica A: Statistical Mechanics and its Applications, 525, 2019, Page(s) 326-336, ISSN 0378-4371
Publisher: Elsevier BV
DOI: 10.1016/j.physa.2019.03.048

Artificial or Human: A New Era of Counterterrorism Intelligence?

Author(s): Boaz Ganor
Published in: Studies in Conflict & Terrorism, 2019, Page(s) 1-20, ISSN 1057-610X
Publisher: Crane Russak
DOI: 10.1080/1057610x.2019.1568815

Religion in war in the 21st century

Author(s): Shmuel Bar
Published in: Comparative Strategy, 39/5, 2020, Page(s) 443-474, ISSN 0149-5933
Publisher: Routledge
DOI: 10.1080/01495933.2020.1803711

A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

Author(s): Indranil Ghosh Ray, Yogachandran Rahulamathava, Muttukrishnan Rajarajan
Published in: IEEE Transactions on Cloud Computing, March 2018, 2018, Page(s) 1-1, ISSN 2168-7161
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/TCC.2018.2820014

Phase space volume scaling of generalized entropies and anomalous diffusion scaling governed by corresponding non-linear Fokker-Planck equations

Author(s): Dániel Czégel, Sámuel G. Balogh, Péter Pollner, Gergely Palla
Published in: Scientific Reports, 8/1, 2018, ISSN 2045-2322
Publisher: Nature Publishing Group
DOI: 10.1038/s41598-018-20202-w

Fighting Terrorism: The Democracy Advantage

Author(s): Amichai Magen
Published in: Journal of Democracy, 29/1, 2018, Page(s) 111-125, ISSN 1086-3214
Publisher: John Hopkins University Press
DOI: 10.1353/jod.2018.0009

A Comprehensive Doctrine for an Evolving Threat: Countering Terrorist Use of Social Networks

Author(s): Eitan Azani, Nadine Liv
Published in: Studies in Conflict & Terrorism, 09 Nov 2018, 2018, Page(s) 1-25, ISSN 1057-610X
Publisher: Crane Russak
DOI: 10.1080/1057610X.2018.1494874

Stability of glassy hierarchical networks

Author(s): M Zamani, L Camargo-Forero, T Vicsek
Published in: New Journal of Physics, 20/2, 2018, Page(s) 023025, ISSN 1367-2630
Publisher: Institute of Physics Publishing
DOI: 10.1088/1367-2630/aaa8ca

Increasing user controllability on device specific privacy in the Internet of Things

Author(s): Waqar Asif, Muttukrishnan Rajarajan, Marios Lestas
Published in: Computer Communications, 116, 2018, Page(s) 200-211, ISSN 0140-3664
Publisher: Elsevier BV
DOI: 10.1016/j.comcom.2017.11.009

The re-tribalisation of the Middle East

Author(s): Shmuel Bar
Published in: Comparative Strategy, 39/2, 2020, Page(s) 128-144, ISSN 0149-5933
Publisher: Routledge
DOI: 10.1080/01495933.2020.1718984

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data

Author(s): K. Rajesh Rao, Indranil Ghosh Ray, Waqar Asif, Ashalatha Nayak, Muttukrishnan Rajarajan
Published in: IEEE Access, 7, 2019, Page(s) 133274-133289, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2941560

Generalised thresholding of hidden variable network models with scale-free property

Author(s): Sámuel G. Balogh, Péter Pollner, Gergely Palla
Published in: Scientific Reports, 9/1, 2019, ISSN 2045-2322
Publisher: Nature Publishing Group
DOI: 10.1038/s41598-019-47628-0

Complex Project to Develop Real Tools for Identifying and Countering Terrorism: Real-time Early Detection and Alert System for Online Terrorist Content Based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event Processing

Author(s): Florea, M., Potlog, C., Pollner, P., Abel, D., Garcia, O., Bar, S., Naqvi, S. and Asif W.
Published in: Series in Security and Digital Forensics, Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, Page(s) Chapter 9, ISBN 9788770220880
Publisher: River Publishers

A Toolbox for Countering Extremist Religious Doctrines

Author(s): Shmuel Bar
Published in: RADICAL ISLAM ANTHOLOGY, 2018, Page(s) 34 37, ISBN 978-1-909035-49-2
Publisher: The Henry Jackson Society,

Optimisation of the coalescent hyperbolic embedding of complex networks

Author(s): Kovács, B. and Palla, G.
Published in: Social and Information Networks, Cornell University, 2020
Publisher: Social and Information Networks

Learning to Observe: Approximating Human Perceptual Thresholds for Detection of Suprathreshold Image Transformations

Author(s): Alan Dolhasz, Carlo Harvey and Ian Williams
Published in: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2020), 2020
Publisher: arXiv

Struggle Over Scripture: Charting the Rift Between Islamist Extremism and Mainstream Islam

Author(s): Milo Comerford, Rachel Bryson, IntuVIew (tech. input)
Published in: 2017
Publisher: Tony Blair Foundation for Global Change