{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:44:22Z","timestamp":1767066262357,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319012841"},{"type":"electronic","value":"9783319012858"}],"license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01285-8_11","type":"book-chapter","created":{"date-parts":[[2013,10,31]],"date-time":"2013-10-31T07:21:57Z","timestamp":1383204117000},"page":"171-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor"],"prefix":"10.1007","author":[{"given":"Martin","family":"Bouchard","sequence":"first","affiliation":[]},{"given":"Kila","family":"Joffres","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Frank","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,1]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1557-2","volume-title":"Dark Web: Exploring and Data Mining the Dark Side of the Web","author":"W Chen","year":"2012","unstructured":"Chen, W.: Dark Web: Exploring and Data Mining the Dark Side of the Web. Springer, New York (2012)"},{"issue":"8","key":"11_CR2","doi-asserted-by":"publisher","first-page":"13471359","DOI":"10.1002\/asi.20838","volume":"59","author":"H Chen","year":"2008","unstructured":"Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., Weinmann, G.: Uncovering the dark web: a case study of Jihad on the Web. J. Am. Soc. Inf. Sci.Technol. 59(8), 13471359 (2008)","journal-title":"J. Am. Soc. Inf. Sci.Technol."},{"key":"11_CR3","unstructured":"Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., Lai, G., Elhourani, T., Bonillas, A., Wang, F.Y., Sageman, M.: Collecting and analyzing the presence of domestic and international terrorist groups on the Web. In: Proceedings of the 7th Annual IEEE Conference on Intelligent Transportation Systems. The dark web portal (2004)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Conway, M.: Reality bites: Cyberterrorism and terrorist use\u2019 of the Internet. http:\/\/www.firstmonday.org\/Issues\/issue7_11\/conway\/index.html (2002)","DOI":"10.5210\/fm.v7i11.1001"},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s13278-011-0030-z","volume":"2","author":"A Cucchiarelli","year":"2012","unstructured":"Cucchiarelli, A., D\u2019Antonio, F., Velardi, P.: Semantically interconnected social networks. Soc. Netw. Anal. Min. 2(1), 69\u201395 (2012)","journal-title":"Soc. Netw. Anal. Min."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Frank, R., Westlake, B., Bouchard, M.: The structure and content of online child exploitation networks. In: Proceedings of the Tenth ACM SIGKDD Workshop on Intelligence and Security Informatics \u201904 (2010)","DOI":"10.1145\/1938606.1938609"},{"key":"11_CR7","unstructured":"Institute for Security Technology Studies, Technical Analysis Group: Examining the cyber capabilities of Islamic Terrorist Groups. http:\/\/www.ists.dartmouth.edu\/ (2004)"},{"issue":"4","key":"11_CR8","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/10576101003587184","volume":"33","author":"M Jacobson","year":"2010","unstructured":"Jacobson, M.: Terrorist financing and the Internet. Stud. Confl. Terror. 33(4), 353\u2013363 (2010)","journal-title":"Stud. Confl. Terror."},{"key":"11_CR9","unstructured":"Jiang, C., Coenen, F., Sanderson, R., Zito, M.: Text classification using graph mining based feature extraction. In: Proceedings of the SGAI \u201909: International Conference on Artificial Intelligence, London (2009)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Joffres, K., Bouchard, M., Frank, R., Westlake, B.: Strategies to disrupt online child pornography networks. In: Proceedings of the 11th ACM SIGKDD Workshop on Intelligence and Security Informatics. 163\u2013170 (2011)","DOI":"10.1109\/EISIC.2011.32"},{"key":"11_CR11","unstructured":"Kamruzzaman, S.M., Farhana, H., Ahmen, R.H.: Text classification using data mining. In: Proceedings of International Conference on Information and Communication Technology in Management \u201905, Multimedia University, Malaysia (2009\/10)"},{"key":"11_CR12","unstructured":"Musawi, M.A.: Cheering for Osama: how Jihadists use internet discussion forums. Quillan Foundation. http:\/\/www.quilliamfoundation.org\/images\/stories\/pdfs\/cheering-for-osama.pdf(2010)"},{"key":"11_CR13","unstructured":"National Research Council: Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. National Academy of Sciences, Washington DC (2002)"},{"key":"11_CR14","unstructured":"Office of Homeland Security: National strategy for homeland security. Office of Homeland Security, Washington DC (2002)"},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1\u201347 (2002)","journal-title":"ACM Comput. Surv."},{"key":"11_CR16","unstructured":"Technical Analysis Group: Examining the cyber capabilities of Islamic Terrorist Groups. Institute for Security Technology Studies at Dartmouth College, Hanover (2004)"},{"key":"11_CR17","first-page":"112","volume":"33","author":"TL Thomas","year":"2003","unstructured":"Thomas, T.L.: Al Qaeda and the Internet: the danger of cyberplanning\u2019. Parameters 33, 112\u2013123 (2003)","journal-title":"Parameters"},{"key":"11_CR18","first-page":"45","volume":"2","author":"S Tong","year":"2002","unstructured":"Tong, S., Koller, D.: Support vector machine active learning with applications to text classification. J. Mach. Learn. Res. 2, 45\u201366 (2002)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"11_CR19","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1080\/10576100290101214","volume":"25","author":"W. Tsfati","year":"2002","unstructured":"Tsfati, W., Weimann, G.: http:\/\/www.terrorism.com: Terror on the Internet. Stud. Confl. Terror. 25(3), 317\u2013332 (2002)","journal-title":"Stud. Confl. Terror."},{"key":"11_CR20","unstructured":"Weimann, G.: http:\/\/www.terror.net: How modern terrorism uses the Internet. Special report, US Institute of Peace. http:\/\/www.usip.org\/pubs\/specialreports\/sr116.pdf (2004)"},{"key":"11_CR21","volume-title":"Terror on the Internet: The New Arena, The New Challenges","author":"G Weimann","year":"2006","unstructured":"Weimann, G.: Terror on the Internet: The New Arena, The New Challenges. United States Institute of Peace, Washington DC (2006)"},{"issue":"2","key":"11_CR22","doi-asserted-by":"publisher","first-page":"104","DOI":"10.2202\/1944-2866.1126","volume":"3","author":"B Westlake","year":"2011","unstructured":"Westlake, B., Bouchard, M., Frank, R.: Finding the key players in online child exploitation networks. Policy Internet 3(2), 104 (2011)","journal-title":"Policy Internet"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/11760146_32","volume":"3975","author":"J Xu","year":"2006","unstructured":"Xu, J., Chen, H., Zhou, Y., Qin, J.: On the topology of the dark web of terrorist groups. Lect. Notes Comput. Sci. 3975, 367\u2013376 (2006)","journal-title":"Lect. Notes Comput. Sci."},{"key":"11_CR24","unstructured":"Zhou, Y., Qin, J., Lai, G., Reid, E., Chen, H.: Building knowledge management system for researching terrorist groups on the Web. In: Proceedings of the 11th Americas Conference on Information Systems \u201905, Omaha, NE, USA (2005)"},{"issue":"5","key":"11_CR25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MIS.2005.96","volume":"20","author":"Y Zhou","year":"2005","unstructured":"Zhou, Y., Reid, E., Qin, J., Chen, H., Lai, G.: U.S. Extremist Groups on the Web: link and content analysis. IEEE Intell. Syst. 20(5), 44\u201351 (2005)","journal-title":"IEEE Intell. Syst."}],"container-title":["Intelligent Systems Reference Library","Computational Models of Complex Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01285-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T03:18:48Z","timestamp":1676344728000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01285-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,1]]},"ISBN":["9783319012841","9783319012858"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01285-8_11","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2013,11,1]]},"assertion":[{"value":"1 November 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}