{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T23:36:08Z","timestamp":1779060968032,"version":"3.51.4"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030034955","type":"print"},{"value":"9783030034962","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03496-2_4","type":"book-chapter","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T12:58:05Z","timestamp":1541681885000},"page":"21-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["On Detecting Online Radicalization Using Natural Language Processing"],"prefix":"10.1007","author":[{"given":"Mourad","family":"Oussalah","sequence":"first","affiliation":[]},{"given":"F.","family":"Faroughian","sequence":"additional","affiliation":[]},{"given":"Panos","family":"Kostakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,9]]},"reference":[{"issue":"5","key":"4_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group web forum messages. Intell. Syst. 20(5), 67\u201375 (2005)","journal-title":"Intell. Syst."},{"issue":"11","key":"4_CR2","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1080\/10576100903259951","volume":"32","author":"L Bowman-Grieve","year":"2009","unstructured":"Bowman-Grieve, L.: Exploring \u201cstormfront:\u201d a virtual community of the radical right. Stud. Confl. Terror. 32(11), 989\u20131007 (2009)","journal-title":"Stud. Confl. Terror."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-319-01285-8_11","volume-title":"Computational Models of Complex Systems","author":"M Bouchard","year":"2014","unstructured":"Bouchard, M., Joffres, K., Frank, R.: Preliminary analytical considerations in designing a terrorism and extremism online network extractor. In: Mago, V., Dabbaghian, V. (eds.) Computational Models of Complex Systems, pp. 171\u2013184. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-3-319-01285-8_11"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Martenson, C., Svenson, P.: Analysis of weak signals for detecting lone wolf terrorist. In: Proceedings of the European Intelligence and Security Informatics Conference, Odense, Denmark, pp. 197\u2013204 (2012)","DOI":"10.1109\/EISIC.2012.20"},{"key":"4_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1557-2","volume-title":"Dark Web: Exploring and Data Mining the Dark Side of the Web","author":"H Chen","year":"2012","unstructured":"Chen, H.: Dark Web: Exploring and Data Mining the Dark Side of the Web. Springer, New York (2012). https:\/\/doi.org\/10.1007\/978-1-4614-1557-2"},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1080\/09546553.2014.849948","volume":"26","author":"K Cohen","year":"2014","unstructured":"Cohen, K., Johansson, F., Kaati, L., Mork, J.: Detecting linguistic markers for radical violence in social media. Terror. Polit. Violence 26(1), 246\u2013256 (2014)","journal-title":"Terror. Polit. Violence"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., Weber, I.: Automated hate speech detection and the problem of offensive language. In: Proceedings of ICWSM (2017)","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Foong, J.J., Oussalah, M.: Cyberbullying system detection and analysis. In: European Conference in Intelligence Security Informatics, Athens (2017)","DOI":"10.1109\/EISIC.2017.43"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1057\/9781137474162_9","volume-title":"Cybercrime Risks and Responses: Eastern and Western Perspectives","author":"R Frank","year":"2015","unstructured":"Frank, R., Bouchard, M., Davies, G., Mei, J.: Spreading the message digitally: a look into extremist content on the internet. In: Smith, R.G., Cheung, R.C.-C., Lau, L.Y.-C. (eds.) Cybercrime Risks and Responses: Eastern and Western Perspectives, pp. 130\u2013145. Palgrave Macmillian, London (2015). https:\/\/doi.org\/10.1057\/9781137474162_9"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Kostakos, P., Oussalah, M.: Meta-terrorism: identifying linguistic patterns in public discourse after an attack. In: SNAST 2018 Web Conference (2018)","DOI":"10.1109\/ASONAM.2018.8508647"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Mei, J., Frank, R.: Sentiment crawling: extremist content collection through a sentiment analysis guided web-crawler. In: Proceedings of the International Symposium on Foundations of Open Source Intelligence and Security Informatics, Paris, France, pp. 1024\u20131027 (2015)","DOI":"10.1145\/2808797.2809373"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"O\u2019Callaghan, D., et al.: Uncovering the wider structure of extreme right communities spanning popular online networks (2013). https:\/\/arxiv.org\/pdf\/1302.1726.pdf","DOI":"10.1145\/2464464.2464495"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Sageman, M.: Leaderless jihad: Terror networks in the twenty-first century. University of Pennsylvania Press, Philadelphia (2008)","DOI":"10.9783\/9780812206784"},{"issue":"7","key":"4_CR14","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1080\/10576100802144072","volume":"31","author":"A Salem","year":"2008","unstructured":"Salem, A., Reid, E., Chen, H.: Multimedia content coding and analyzis: unraveling the content of Jihadi extremist groups\u2019s video. Stud. Confl. Terror. 31(7), 605\u2013626 (2008)","journal-title":"Stud. Confl. Terror."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Wang, J., Cong, G., Zhao, W.X., Li, X.: Mining user intents in Twitter: a semi-supervised approach to inferring intent categories for tweets. In: AAAI (2015)","DOI":"10.1609\/aaai.v29i1.9196"},{"issue":"1","key":"4_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1177\/0002764208321342","volume":"52","author":"G Weimann","year":"2008","unstructured":"Weimann, G.: The psychology of mass-mediated terrorism. Am. Behav. Sci. 52(1), 69\u201386 (2008)","journal-title":"Am. Behav. Sci."},{"issue":"2","key":"4_CR17","first-page":"45","volume":"16","author":"G Weimann","year":"2010","unstructured":"Weimann, G.: Terror on Facebook, Twitter, and YouTube. Brown J. World Affairs 16(2), 45\u201354 (2010)","journal-title":"Brown J. World Affairs"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Zhou, H., Wang, J., Wu, J., Zhang, L., Lei, P., Chen, X.: Application of the hybrid SVM-KNN model for credit scoring. In: 2013 Ninth International Conference on Computational Intelligence and Security (2013). https:\/\/doi.org\/10.1109\/cis.2013.43","DOI":"10.1109\/cis.2013.43"},{"issue":"1","key":"4_CR19","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1080\/19434472.2016.1276612","volume":"10","author":"R Scrivens","year":"2017","unstructured":"Scrivens, R., Davies, G., Frank, R.: Searching for signs of extremism on the web: an introduction to sentiment-based identification of radical authors. Behav. Sci. Terror. Polit. Aggress. 10(1), 39\u201359 (2017)","journal-title":"Behav. Sci. Terror. Polit. Aggress."}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03496-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:11:35Z","timestamp":1709824295000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03496-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030034955","9783030034962"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03496-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDEAL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Data Engineering and Automated Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ideal2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aida.ii.uam.es\/ideal2018\/#!\/main","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}