The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstract-The paper presents a model to detect terrorism evidence in textual documents. The model pre-processes domain specific documents to extract the general patterns of text associated with the domain. The model then incorporates the Conditional Random Field (CRF) model for detection of sentences containing patterns of terrorism evidence. For incorporation of CRF model, the features are selected...
This paper discusses new trends in terrorist networks. We investigate a new case study regarding the recent Denmark terror plan and present analysis of the thwarted plot. Analyzing covert networks after an incident is practically easy for trial purposes. Mapping clandestine networks to thwarted terrorist activities is much more complicated. The network surrounding the recent Denmark terror plan is...
A terrorist network is a special kind of social network with emphasis on both secrecy and efficiency. Such networks are intentionally structured to ensure efficient communication between members without being detected. A terrorist network can be modeled as a generalized network (graph) consisting of nodes and links. Techniques from social network analysis and graph theory can be used to identify key...
The abundance of information regarding the most of domains makes Internet the best resource. Besides its usefulness, it is however difficult to automate the process of information extraction due to lack of structure in online information. The most commonly used information sharing protocol Hyper Text Transfer Protocol (HTTP) makes it possible to embed a lot of noise (like advertisements, images, headers,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.