European Commission logo
English English
CORDIS - EU research results
CORDIS

Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event Processing

Deliverables

Publications

Efficient One-to-One Pair Matching for 2-D and 3-D Edge Detection Evaluation, VISAPP 2020

Author(s): Samuel Smith, Ian Williams
Published in: 15th International Conference on Computer Vision Theory and Applications, 2020, ISBN 978-989-758-402-2
Publisher: SCITEPRESS

Towards Unsupervised Image Harmonisation, VISAPP 2020

Author(s): Alan, Dolhasz, Carlo Harvey and Ian Williams
Published in: 15th International Conference on Computer Vision Theory and Applications, 2020, ISBN 978-989-758-402-2
Publisher: SCITEPRESS

Towards Fully Integrated Real-time Detection Framework for Online Contents Analysis - RED-Alert Approach

Author(s): Syed Naqvi, Ian Williams, Sean Enderby, Peter Pollner, Daniel Abel, Berta Biescas, Oscar Garcia, Monica Florea, Cristi Potlog
Published in: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2019, Page(s) 257-263, ISBN 978-1-7281-3026-2
Publisher: IEEE
DOI: 10.1109/eurospw.2019.00035

Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities

Author(s): Naqvi, S. and Enderby, S. and Williams, I. and Asif W. and Rajarajan, M. and Potlog, C. and Florea, M.
Published in: 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2019
Publisher: BCU Open Access Repository

Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations

Author(s): Waqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan
Published in: 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2018, Page(s) 329-334, ISBN 978-1-5386-5889-5
Publisher: IEEE
DOI: 10.1109/SNPD.2018.8441144

Emergence of Leader-Follower Hierarchy Among Players in an On-Line Experiment

Author(s): Balint J. Toth, Gergely Palla, Enys Mones, Gergo Havadi, Nora Pall, Peter Pollner, Tamas Vicsek
Published in: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 2018, Page(s) 1184-1190, ISBN 978-1-5386-6051-5
Publisher: IEEE
DOI: 10.1109/asonam.2018.8508278

Preference in the restructuring mechanisms of time evolving hierarchies

Author(s): Gergely Palla, Dániel Zagyva, Sámuel G. Balogh and Péter Pollner
Published in: COMPLEX NETWORKS 2018, 2018, ISBN 978-2-9557050-2-5
Publisher: .

A generalized class of thresholding functions for the hidden variable model of scale-free networks

Author(s): Gáspár Sámuel Balogh, Péter Pollner and Gergely Palla
Published in: COMPLEX NETWORKS 2018, 2018, ISBN 978-2-9557050-2-5
Publisher: .

Measuring the stability of complex hierarchical networks

Author(s): M Zamani and T Vicsek
Published in: The 6 th International Conference on Complex Networks & Their Applications, 2017, ISBN 978-2-9557050-2-5
Publisher: .

Differences in structure and dynamics of networks retrieved from dark and public web forums

Author(s): Maryam Zamani, Fereshteh Rabbani, Attila Horicsányi, Anna Zafeiris, Tamas Vicsek
Published in: Physica A: Statistical Mechanics and its Applications, Issue 525, 2019, Page(s) 326-336, ISSN 0378-4371
Publisher: Elsevier BV
DOI: 10.1016/j.physa.2019.03.048

Artificial or Human: A New Era of Counterterrorism Intelligence?

Author(s): Boaz Ganor
Published in: Studies in Conflict & Terrorism, 2019, Page(s) 1-20, ISSN 1057-610X
Publisher: Crane Russak
DOI: 10.1080/1057610x.2019.1568815

Religion in war in the 21st century

Author(s): Shmuel Bar
Published in: Comparative Strategy, Issue 39/5, 2020, Page(s) 443-474, ISSN 0149-5933
Publisher: Routledge
DOI: 10.1080/01495933.2020.1803711

A New Lightweight Symmetric Searchable Encryption Scheme for String Identification

Author(s): Indranil Ghosh Ray, Yogachandran Rahulamathava, Muttukrishnan Rajarajan
Published in: IEEE Transactions on Cloud Computing, Issue March 2018, 2018, Page(s) 1-1, ISSN 2168-7161
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/TCC.2018.2820014

Phase space volume scaling of generalized entropies and anomalous diffusion scaling governed by corresponding non-linear Fokker-Planck equations

Author(s): Dániel Czégel, Sámuel G. Balogh, Péter Pollner, Gergely Palla
Published in: Scientific Reports, Issue 8/1, 2018, ISSN 2045-2322
Publisher: Nature Publishing Group
DOI: 10.1038/s41598-018-20202-w

Fighting Terrorism: The Democracy Advantage

Author(s): Amichai Magen
Published in: Journal of Democracy, Issue 29/1, 2018, Page(s) 111-125, ISSN 1086-3214
Publisher: John Hopkins University Press
DOI: 10.1353/jod.2018.0009

A Comprehensive Doctrine for an Evolving Threat: Countering Terrorist Use of Social Networks

Author(s): Eitan Azani, Nadine Liv
Published in: Studies in Conflict & Terrorism, Issue 09 Nov 2018, 2018, Page(s) 1-25, ISSN 1057-610X
Publisher: Crane Russak
DOI: 10.1080/1057610X.2018.1494874

Stability of glassy hierarchical networks

Author(s): M Zamani, L Camargo-Forero, T Vicsek
Published in: New Journal of Physics, Issue 20/2, 2018, Page(s) 023025, ISSN 1367-2630
Publisher: Institute of Physics Publishing
DOI: 10.1088/1367-2630/aaa8ca

Increasing user controllability on device specific privacy in the Internet of Things

Author(s): Waqar Asif, Muttukrishnan Rajarajan, Marios Lestas
Published in: Computer Communications, Issue 116, 2018, Page(s) 200-211, ISSN 0140-3664
Publisher: Elsevier BV
DOI: 10.1016/j.comcom.2017.11.009

The re-tribalisation of the Middle East

Author(s): Shmuel Bar
Published in: Comparative Strategy, Issue 39/2, 2020, Page(s) 128-144, ISSN 0149-5933
Publisher: Routledge
DOI: 10.1080/01495933.2020.1718984

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data

Author(s): K. Rajesh Rao, Indranil Ghosh Ray, Waqar Asif, Ashalatha Nayak, Muttukrishnan Rajarajan
Published in: IEEE Access, Issue 7, 2019, Page(s) 133274-133289, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2941560

Generalised thresholding of hidden variable network models with scale-free property

Author(s): Sámuel G. Balogh, Péter Pollner, Gergely Palla
Published in: Scientific Reports, Issue 9/1, 2019, ISSN 2045-2322
Publisher: Nature Publishing Group
DOI: 10.1038/s41598-019-47628-0

Complex Project to Develop Real Tools for Identifying and Countering Terrorism: Real-time Early Detection and Alert System for Online Terrorist Content Based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event Processing

Author(s): Florea, M., Potlog, C., Pollner, P., Abel, D., Garcia, O., Bar, S., Naqvi, S. and Asif W.
Published in: Series in Security and Digital Forensics, Issue Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, Page(s) Chapter 9, ISBN 9788770220880
Publisher: River Publishers

A Toolbox for Countering Extremist Religious Doctrines

Author(s): Shmuel Bar
Published in: RADICAL ISLAM ANTHOLOGY, 2018, Page(s) 34 37, ISBN 978-1-909035-49-2
Publisher: The Henry Jackson Society,

Optimisation of the coalescent hyperbolic embedding of complex networks

Author(s): Kovács, B. and Palla, G.
Published in: Social and Information Networks, Cornell University, 2020
Publisher: Social and Information Networks

Learning to Observe: Approximating Human Perceptual Thresholds for Detection of Suprathreshold Image Transformations

Author(s): Alan Dolhasz, Carlo Harvey and Ian Williams
Published in: IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2020), 2020
Publisher: arXiv

Struggle Over Scripture: Charting the Rift Between Islamist Extremism and Mainstream Islam

Author(s): Milo Comerford, Rachel Bryson, IntuVIew (tech. input)
Published in: 2017
Publisher: Tony Blair Foundation for Global Change

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available