Stelios Andreadis, Ilias Gialampoukidis, George Kalpakis, T. Tsikrika, S. Papadopoulos, S. Vrochidis, Y. Kompatsiaris
{"title":"社会媒体网络中与恐怖主义有关的关键人物和关键社区的监测工具","authors":"Stelios Andreadis, Ilias Gialampoukidis, George Kalpakis, T. Tsikrika, S. Papadopoulos, S. Vrochidis, Y. Kompatsiaris","doi":"10.1109/EISIC.2017.41","DOIUrl":null,"url":null,"abstract":"Terrorists communicate and disseminate their activitiesusing social media, such as Twitter, where complex networksof user accounts are formed and need to be effectively analysedby Law Enforcement Agencies (LEAs). To this end, we proposea novel visualisation tool that assists intelligence analysts andinvestigators through the presentation of the network formation,components, key-players, key-communities and through supportof keyword search in the terrorism domain, highlighting alsosuspended users and offering navigation in the user network","PeriodicalId":436947,"journal":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","volume":"432 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media Networks\",\"authors\":\"Stelios Andreadis, Ilias Gialampoukidis, George Kalpakis, T. Tsikrika, S. Papadopoulos, S. Vrochidis, Y. Kompatsiaris\",\"doi\":\"10.1109/EISIC.2017.41\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Terrorists communicate and disseminate their activitiesusing social media, such as Twitter, where complex networksof user accounts are formed and need to be effectively analysedby Law Enforcement Agencies (LEAs). To this end, we proposea novel visualisation tool that assists intelligence analysts andinvestigators through the presentation of the network formation,components, key-players, key-communities and through supportof keyword search in the terrorism domain, highlighting alsosuspended users and offering navigation in the user network\",\"PeriodicalId\":436947,\"journal\":{\"name\":\"2017 European Intelligence and Security Informatics Conference (EISIC)\",\"volume\":\"432 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 European Intelligence and Security Informatics Conference (EISIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EISIC.2017.41\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 European Intelligence and Security Informatics Conference (EISIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EISIC.2017.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media Networks
Terrorists communicate and disseminate their activitiesusing social media, such as Twitter, where complex networksof user accounts are formed and need to be effectively analysedby Law Enforcement Agencies (LEAs). To this end, we proposea novel visualisation tool that assists intelligence analysts andinvestigators through the presentation of the network formation,components, key-players, key-communities and through supportof keyword search in the terrorism domain, highlighting alsosuspended users and offering navigation in the user network