2018 “In
the words of the enemy: The Islamic State’s reflexive projection of
statehood”. Critical Studies on
Terrorism11(1): 45–64. 10.1080/17539153.2017.1338327
Ali, Mohammed
Mahmood, Khaja
Moizuddin Mohammed, and Lakshmi Rajamani
2014 “Framework
for surveillance of instant messages in instant messengers and social networking sites using data mining and
ontology”. Proceedings of the 2014 IEEE Students’ Technology
Symposium: 297–302. 10.1109/TechSym.2014.6808064
Argamon, Shlomo, Marin Šarić, and Sterlin
Stuart Stein
2003 “Style
mining of electronic messages for multiple authorship discrimination: First
results”. InProceedings of the Ninth ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, ed. byLise Getoor, Ted Senator, Pedro Domingos, and Christos Faloutsos, pp.475–480. 10.1145/956750.956805
Benigni, Matthew
C., Joseph Kenneth, and Kathleen
M. Carley
2017 “Online
extremism and the communities that sustain it: Detecting the ISIS supporting community on
Twitter”. PLoS
ONE12(12). 10.1371/journal.pone.0181405
2016 “Towards
a guide for constructing and disseminating counter-narratives to reduce support for
terrorism”. Studies in Conflict and
Terrorism39(5): 381–404. 10.1080/1057610X.2015.1116277
2015 “The
use of structures in communication networks to track membership in terrorist groups”. Journal
of Terrorism
Research6(1): 1–18. 10.15664/jtr.1073
2015 “The
remote securitisation of Islam in the US post-9/11: Euphemisation, metaphors and the ‘logic of expected consequences’ in
counter-radicalisation discourse”. Critical Studies on
Terrorism8(2): 246–265. 10.1080/17539153.2015.1053747
2015 “Framing
hostage negotiations: Analysing the discourse of the US government and the Islamic
State”. Critical Studies on
Terrorism8(3): 516–531. 10.1080/17539153.2015.1091655
2013 “Detection
of user cluster with suspicious activity in online Social Networking Sites”. 2nd International
Conference on Advanced Computing, Networking and
Security, pp.220–225. 10.1109/ADCONS.2013.17
2014 “Toward
a profile of lone wolf terrorists: What moves an individual from radical opinion to radical
action”. Terrorism and Political
Violence26(1): 69–85. 10.1080/09546553.2014.849916
2013 “Options and strategies for
countering online radicalization in the United States”. Studies in Conflict and
Terrorism36(6): 431–459. 10.1080/1057610X.2013.784568
2012 “The
language of Islamic extremism: Towards an automated identification of beliefs, motivations and
justifications”. International Journal of Corpus
Linguistics17(2): 259–286. 10.1075/ijcl.17.2.05pre
Qureshi, Pir Abdul
Rasool, Nasrullah Memon, and Uffe
Kock Wiil
2010 “EWaS:
Novel approach for generating early warnings to prevent terrorist
attacks”. In2010 Second International Conference on Computer
Engineering and Applications, ICCEA 2010, ed. byJ. E. Guerrero, 410–414. Los
Alamitos, Calif.: IEEE. 10.1109/ICCEA.2010.230
2015 “The
incitement of terrorism on the Internet: Legal standards, enforcement, and the role of the European
Union”. Michigan Journal of International
Law36(2): 321–351.
2003 “The
psychology of cyber-terrorism”. InTerrorists, Victims and Society:
Psychological Perspectives on Terrorism and its Consequences, ed. byAndrew Silke, 77–92. Chichester: Wiley. 10.1002/9780470713600.ch4
2015 “The
evolution of the ISIS’ language: A quantitative analysis of the language of the first year of Dabiq
magazine”. Sicurezza, Terrorismo e
Società2: 7–20.
2013 “Tracking
on-line radicalization using investigative data mining”. 2013 National Conference on
Communications, NCC 2013. New
Delhi: IEEE, pp.674–678. 10.1109/NCC.2013.6488046