Detection of Jihadism in Social Networks Using Big Data Techniques Supported by Graphs and Fuzzy Clustering
Social networks are being used by terrorist organizations to distribute messages with the intention of influencing people and recruiting new members. The research presented in this paper focuses on the analysis of Twitter messages to detect the leaders orchestrating terrorist networks and their foll...
Saved in:
Main Authors: | Cristina Sánchez-Rebollo, Cristina Puente, Rafael Palacios, Claudia Piriz, Juan P. Fuentes, Javier Jarauta |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2019-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2019/1238780 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Three reformers against violent jihad
by: Peter Robert Demant
Published: (2018-07-01) -
A Novel Clustering Technique for Efficient Clustering of Big Data in Hadoop Ecosystem
by: Sunil Kumar, et al.
Published: (2019-12-01) -
Big Data Analytics: A Tutorial of Some Clustering Techniques
by: Said Baadel
Published: (2021-09-01) -
Using fuzzy clustering to reconstruct alert correlation graph of intrusion detection
by: MA Lin-ru1, et al.
Published: (2006-01-01) -
A Christian Perspective on Islamic Concepts of Jihad, Iman And Islam in the Context of Mindanao Peace Process
by: Jerson Benia Narciso
Published: (2024-07-01)