{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:43:03Z","timestamp":1757544183750,"version":"3.41.2"},"reference-count":94,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T00:00:00Z","timestamp":1641427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DTA"],"published-print":{"date-parts":[[2022,8,23]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>With the proliferation of terrorist\/extremist websites on the World Wide Web, it has become progressively more crucial to detect and analyze the content on these websites. Accordingly, the volume of previous research focused on identifying the techniques and activities of terrorist\/extremist groups, as revealed by their sites on the so-called dark web, has also grown.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This study presents a review of the techniques used to detect and process the content of terrorist\/extremist sites on the dark web. Forty of the most relevant data sources were examined, and various techniques were identified among them.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Based on this review, it was found that methods of feature selection and feature extraction can be used as topic modeling with content analysis and text clustering.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>At the end of the review, present the current state-of-the- art and certain open issues associated with Arabic dark Web content analysis.<\/jats:p><\/jats:sec>","DOI":"10.1108\/dta-07-2021-0177","type":"journal-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T07:09:04Z","timestamp":1641366544000},"page":"461-482","source":"Crossref","is-referenced-by-count":7,"title":["Techniques to detect terrorists\/extremists on the dark web: a review"],"prefix":"10.1108","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5951-2498","authenticated-orcid":false,"given":"Hanan","family":"Alghamdi","sequence":"first","affiliation":[]},{"given":"Ali","family":"Selamat","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2022,1,6]]},"reference":[{"issue":"5","key":"key2022082217162586900_ref001","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MIS.2005.81","article-title":"Applying authorship analysis to extremist-group Web forum messages","volume":"20","year":"2005","journal-title":"IEEE Intelligent Systems"},{"key":"key2022082217162586900_ref002","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1109\/isi.2007.379486","article-title":"Affect intensity analysis of dark web forums","year":"2007"},{"key":"key2022082217162586900_ref003","doi-asserted-by":"crossref","unstructured":"Abbasi, A. and Chen, H. (2008), \u201cAnalysis of affect intensities in extremist group forums\u201d, in Chen, H., Reid, E., Sinai, J., Silke, A. and Ganor, B. (Eds), Terrorism Informatics. Integrated Series in Information Systems, Springer, Boston, MA, Vol. 18, doi: 10.1007\/978-0-387-71613-8_14.","DOI":"10.1007\/978-0-387-71613-8_14"},{"issue":"3","key":"key2022082217162586900_ref004","doi-asserted-by":"publisher","DOI":"10.1145\/1361684.1361685","article-title":"Sentiment analysis in multiple languages: feature selection for opinion classification in Web forums","volume":"26","year":"2008","journal-title":"ACM Transactions on Information Systems"},{"issue":"1","key":"key2022082217162586900_ref005","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0185-6","article-title":"Detection and classification of social media-based extremist affiliations using sentiment analysis techniques","volume":"9","year":"2019","journal-title":"Human-Centric Computing and Information Sciences"},{"year":"2007","key":"key2022082217162586900_ref006","article-title":"The Arabic language and the semantic web: challenges and opportunities"},{"key":"key2022082217162586900_ref007","doi-asserted-by":"publisher","first-page":"42384","DOI":"10.1109\/ACCESS.2021.3064178","article-title":"Online extremism detection in textual content: a systematic literature review","volume":"9","year":"2021","journal-title":"IEEE Access"},{"issue":"5","key":"key2022082217162586900_ref008","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s10796-016-9712-4","article-title":"Multimode co-clustering for analyzing terrorist networks","volume":"20","year":"2018","journal-title":"Information Systems Frontiers"},{"issue":"10","key":"key2022082217162586900_ref009","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijmecs.2019.10.01","article-title":"Mining the dark web: a novel approach for placing a dark website under investigation","volume":"11","year":"2019","journal-title":"International Journal of Modern Education and Computer Science"},{"issue":"4","key":"key2022082217162586900_ref010","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1177\/0049124117729696","article-title":"Using radical environmentalist texts to uncover network structure and network features","volume":"48","year":"2019","journal-title":"Sociological Methods and Research"},{"article-title":"Error tracking using advanced web mining perspective","year":"2009","key":"key2022082217162586900_ref011","doi-asserted-by":"publisher","DOI":"10.1109\/IAMA.2009.5228034"},{"key":"key2022082217162586900_ref012","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/ISI.2012.6284289","article-title":"Identifying cliques in dark web forums - an agglomerative clustering approach","year":"2012"},{"key":"key2022082217162586900_ref013","doi-asserted-by":"publisher","first-page":"17877","DOI":"10.1109\/ACCESS.2020.2967219","article-title":"An approach for radicalization detection based on emotion signals and semantic similarity","volume":"8","year":"2020","journal-title":"IEEE Access"},{"issue":"January","key":"key2022082217162586900_ref014","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101345","article-title":"Sentiment analysis of extremism in social media from textual information","volume":"48","year":"2020","journal-title":"Telematics and Informatics"},{"key":"key2022082217162586900_ref015","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1057610X.2021.1927203","article-title":"Identifying key players in violent extremist networks: using socio-semantic network analysis","volume-title":"In Studies in Conflict and Terrorism","year":"2021"},{"key":"key2022082217162586900_ref016","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/ISI.2013.6578778","article-title":"Evaluating text visualization: an experiment in authorship analysis","year":"2013"},{"issue":"1","key":"key2022082217162586900_ref017","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13388-014-0010-8","article-title":"Evaluating text visualization for authorship analysis","volume":"3","year":"2014","journal-title":"Security Informatics"},{"key":"key2022082217162586900_ref018","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/ASONAM.2009.31","article-title":"Combining social network analysis and sentiment analysis to explore the potential for online radicalisation","year":"2009"},{"article-title":"An Arabic language framework for semantic web","year":"2011","key":"key2022082217162586900_ref019","doi-asserted-by":"publisher","DOI":"10.1109\/STAIR.2011.5995757"},{"key":"key2022082217162586900_ref020","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-319-01285-8_11","article-title":"Preliminary analytical considerations in designing a terrorism and extremism online network extractor","volume":"53","year":"2014","journal-title":"Intelligent Systems Reference Library"},{"first-page":"674","article-title":"Application of latent semantic indexing in generating graphs of terrorist networks","year":"2006","key":"key2022082217162586900_ref021"},{"issue":"1","key":"key2022082217162586900_ref022","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10791-011-9171-y","article-title":"Arabic texts analysis for topic modeling evaluation","volume":"15","year":"2012","journal-title":"Information Retrieval"},{"issue":"1","key":"key2022082217162586900_ref023","doi-asserted-by":"publisher","first-page":"122","DOI":"10.7763\/IJIMT.2013.V4.373","article-title":"Affect analysis of radical contents on web forums using SentiWordNet","volume":"4","year":"2013","journal-title":"International Journal of Innovation Management and Technology"},{"volume-title":"Intelligence and Security Informatics for International Security: Information Sharing and Data Mining","year":"2006","key":"key2022082217162586900_ref024"},{"key":"key2022082217162586900_ref025","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/ISI.2008.4565038","article-title":"Sentiment and affect analysis of Dark Web forums: measuring radicalization on the internet","year":"2008"},{"key":"key2022082217162586900_ref026","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/ISI.2008.4565035","article-title":"Discovery of improvised explosive device content in the dark web","year":"2008","journal-title":"IEEE International Conference on Intelligence and Security Informatics, 2008"},{"first-page":"94","article-title":"IEDs in the dark web: genre classification of improvised explosive device web pages","year":"2008","key":"key2022082217162586900_ref027"},{"key":"key2022082217162586900_ref028","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/ISI.2009.5137293","article-title":"IEDs in the dark web: lexicon expansion and genre classification","year":"2009"},{"issue":"8","key":"key2022082217162586900_ref029","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1002\/asi","article-title":"Uncovering the dark web: a case study of Jihad on the web","volume":"59","year":"2008","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2022082217162586900_ref030","doi-asserted-by":"crossref","unstructured":"Chen, H., Qin, J., Reid, E. and Zhou, Y. (2008b), \u201cStudying global extremist organizations' internet presence using the dark web attribute system\u201d, in Terrorism Informatics, Springer, pp. 237-266.","DOI":"10.1007\/978-0-387-71613-8_12"},{"first-page":"98","article-title":"Cyber extremism in web 2.0: an exploratory study of international Jihadist groups","year":"2008","key":"key2022082217162586900_ref031"},{"volume-title":"Al-Qaeda: in Search of the Terror Network that Threatens the World","year":"2003","key":"key2022082217162586900_ref032"},{"issue":"5","key":"key2022082217162586900_ref033","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1108\/14684520610706398","article-title":"Structural analysis of chat messages for topic detection","volume":"30","year":"2006","journal-title":"Online Information Review"},{"key":"key2022082217162586900_ref034","unstructured":"Dragos, V., Kervarc, R. and Bruyant, J.-P. (2019), \u201cSemantic approaches to analyse radicalized content: challenges and novel solutions\u201d, in The Fight against Failure and Speech against Speech (Issue September 2018)."},{"first-page":"115","article-title":"Automatic cross-language retrieval using latent semantic indexing","year":"1997","key":"key2022082217162586900_ref035"},{"issue":"1","key":"key2022082217162586900_ref036","first-page":"17","article-title":"Using data mining techniques for detecting terror-related activities on the web","volume":"3","year":"2004","journal-title":"Journal of Information Warfare"},{"key":"key2022082217162586900_ref037","doi-asserted-by":"crossref","unstructured":"Elovici, Y., Shapira, B., Last, M., Zaafrany, O., Friedman, M., Schneider, M. and Kandel, A. (2008), \u201cContent-based detection of terrorists browsing the web using an advanced terror detection system (ATDS)\u201d, in Terrorism Informatics, Springer, pp. 365-384.","DOI":"10.1007\/978-0-387-71613-8_17"},{"key":"key2022082217162586900_ref038","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/ACT.2010.35","article-title":"Implementation of intelligent searching using self-organizing map for webmining used in document containing information in relation to cyber terrorism","year":"2010"},{"issue":"6","key":"key2022082217162586900_ref039","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.16984\/saufenbilder.711612","article-title":"A sentiment analysis model for terrorist attacks reviews on Twitter","volume":"24","year":"2020","journal-title":"Sakarya University Journal of Science"},{"issue":"6","key":"key2022082217162586900_ref040","doi-asserted-by":"publisher","first-page":"1213","DOI":"10.1002\/asi","article-title":"A focused crawler for dark web forums","volume":"61","year":"2010","journal-title":"Journal of the American Society for Information Science"},{"issue":"C","key":"key2022082217162586900_ref041","doi-asserted-by":"publisher","first-page":"48364","DOI":"10.1109\/ACCESS.2021.3068313","article-title":"Online extremism detection: a systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools","volume":"9","year":"2021","journal-title":"IEEE Access"},{"first-page":"13","article-title":"A latent Dirichlet framework for relevance modeling","year":"2009","key":"key2022082217162586900_ref042"},{"issue":"2-3","key":"key2022082217162586900_ref043","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1080\/01638539809545028","article-title":"An introduction to latent semantic analysis","volume":"25","year":"1998","journal-title":"Discourse Processes"},{"key":"key2022082217162586900_ref044","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1145\/1008992.1009061","article-title":"Language-specific models in multilingual topic tracking","year":"2004"},{"key":"key2022082217162586900_ref045","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/ISI.2009.5137274","article-title":"Dark web forums portal: searching and analyzing Jihadist forums","year":"2009"},{"key":"key2022082217162586900_ref046","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-69209-6_5","article-title":"Multi-lingual detection of web terrorist content","volume":"135","year":"2008","journal-title":"Studies in Computational Intelligence"},{"article-title":"Topic-based social network analysis for virtual communities of interests in the dark web","year":"2010","key":"key2022082217162586900_ref047","doi-asserted-by":"publisher","DOI":"10.1145\/1938606.1938615"},{"key":"key2022082217162586900_ref048","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/CICN.2011.97","article-title":"Information extraction using web usage mining, web scrapping and semantic annotation","year":"2011"},{"issue":"3","key":"key2022082217162586900_ref049","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1134\/S0361768819030058","article-title":"Machine learning methods for detecting and monitoring extremist information on the internet","volume":"45","year":"2019","journal-title":"Programming and Computer Software"},{"issue":"3","key":"key2022082217162586900_ref050","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1568292.1568295.http","article-title":"Web search clustering and labeling with hidden topics","volume":"8","year":"2009","journal-title":"ACM Transactions on Asian Language Information Processing"},{"issue":"2","key":"key2022082217162586900_ref051","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1108\/K-10-2016-0300","article-title":"Hybrid supervised clustering based ensemble scheme for text classification","volume":"46","year":"2017","journal-title":"Kybernetes"},{"issue":"2019","key":"key2022082217162586900_ref052","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-030-19807-7_29","article-title":"Topic-enriched word embeddings for sarcasm identification","volume":"984","year":"2019","journal-title":"Advances in Intelligent Systems and Computing"},{"issue":"2019","key":"key2022082217162586900_ref053","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5901087","article-title":"Consensus clustering-based undersampling approach to imbalanced learning","year":"2019","journal-title":"Scientific Programming"},{"issue":"January","key":"key2022082217162586900_ref054","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.5909","article-title":"Sentiment analysis on product reviews based on weighted word embeddings and deep neural networks","year":"2020","journal-title":"Concurrency Computation"},{"issue":"3","key":"key2022082217162586900_ref055","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1002\/cae.22253","article-title":"Sentiment analysis on massive open online course evaluations: a text mining and deep learning approach","volume":"29","year":"2021","journal-title":"Computer Applications in Engineering Education"},{"issue":"2","key":"key2022082217162586900_ref056","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.3906\/elk-1907-11","article-title":"Satire identification in Turkish news articles based on ensemble of classifiers","volume":"28","year":"2020","journal-title":"Turkish Journal of Electrical Engineering and Computer Sciences"},{"key":"key2022082217162586900_ref057","doi-asserted-by":"publisher","first-page":"7701","DOI":"10.1109\/ACCESS.2021.3049734","article-title":"A term weighted neural language model and stacked bidirectional LSTM based framework for sarcasm identification","volume":"9","year":"2021","journal-title":"IEEE Access"},{"key":"key2022082217162586900_ref058","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2016.06.005","article-title":"A multiobjective weighted voting ensemble classifier based on differential evolution algorithm for text sentiment classification","volume":"62","year":"2016","journal-title":"Expert Systems with Applications"},{"key":"key2022082217162586900_ref059","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.eswa.2016.03.045","article-title":"Ensemble of keyword extraction methods and classifiers in text classification","volume":"57","year":"2016","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"key2022082217162586900_ref060","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1016\/j.ipm.2017.02.008","article-title":"A hybrid ensemble pruning approach based on consensus clustering and multi-objective evolutionary algorithm for sentiment classification","volume":"53","year":"2017","journal-title":"Information Processing and Management"},{"key":"key2022082217162586900_ref061","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.future.2020.05.034","article-title":"A review of sentiment analysis research in Arabic language","volume":"112","year":"2020","journal-title":"Future Generation Computer Systems"},{"issue":"11","key":"key2022082217162586900_ref062","first-page":"1816","article-title":"A novel approach for social network analysis and web mining for counter terrorism","volume":"4","year":"2012","journal-title":"International Journal on Computer Science and Engineering (IJCSE)"},{"issue":"3","key":"key2022082217162586900_ref063","first-page":"463","article-title":"A novel approach for recognized and overcrowding of terrorist websites","volume":"4","year":"2013","journal-title":"International Journal of Engineering Trends and Technology"},{"issue":"1","key":"key2022082217162586900_ref064","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s10796-010-9272-y","article-title":"Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict","volume":"13","year":"2011","journal-title":"Information Systems Frontiers"},{"key":"key2022082217162586900_ref065","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/ASONAM.2010.81","article-title":"A hierarchical algorithm for clustering extremist web pages","year":"2010"},{"issue":"1","key":"key2022082217162586900_ref066","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ijhcs.2006.08.012","article-title":"Analyzing terror campaigns on the internet: technical sophistication, content richness, and Web interactivity","volume":"65","year":"2007","journal-title":"International Journal of Human Computer Studies"},{"issue":"1","key":"key2022082217162586900_ref067","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10796-010-9277-6","article-title":"A multi-region empirical study on the internet presence of global extremist organizations","volume":"13","year":"2011","journal-title":"Information Systems Frontiers"},{"key":"key2022082217162586900_ref068","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/11427995_35","article-title":"Collecting and analyzing the presence of terrorists on the Web: a case study of Jihad Websites","volume":"3495","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"key2022082217162586900_ref069","unstructured":"Reinares, F., Alonso, R., Bj\u00f8rgo, T., Porta, D. D., Coolsaet, R., Khosrokhavar, F., Lohlker, R., Ranstorp, M., Schmid, A.P., Silke, A., Taarnby, M. and De Vries, G. (2008), \u201cRadicalisation processes leading to acts of terrorism\u201d, A Concise Report Prepared by the European Commission\u2019s Expert Group on Violent Radicalisation, May, 20, available at: https:\/\/biblio.ugent.be\/publication\/446365\/file\/6814706."},{"issue":"1","key":"key2022082217162586900_ref070","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10796-010-9271-z","article-title":"Tracking and disrupting dark networks: challenges of data collection and analysis","volume":"13","year":"2011","journal-title":"Information Systems Frontiers"},{"key":"key2022082217162586900_ref071","doi-asserted-by":"crossref","unstructured":"Sabbah, T. and Selamat, A. (2014), \u201cModified frequency-based term weighting scheme for accurate dark web content classification\u201d, in Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8870, pp. 184-196, doi: 10.1007\/978-3-319-12844-3_16.","DOI":"10.1007\/978-3-319-12844-3_16"},{"key":"key2022082217162586900_ref072","doi-asserted-by":"publisher","first-page":"1908","DOI":"10.1016\/j.neucom.2015.09.063","article-title":"Hybridized term-weighting method for Dark Web classification","volume":"173","year":"2016","journal-title":"Neurocomputing"},{"issue":"5","key":"key2022082217162586900_ref073","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1080\/01969722.2018.1553591","article-title":"A comparative study and automated detection of illegal weapon procurement over dark web","volume":"50","year":"2019","journal-title":"Cybernetics and Systems"},{"volume-title":"Automatic Detection and Forecasting of Violent Extremist Cyber-Recruitment (Issue May)","year":"2014","key":"key2022082217162586900_ref074"},{"key":"key2022082217162586900_ref075","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/ACT.2010.40","article-title":"Text classification techniques used to facilitate cyber terrorism investigation","year":"2010"},{"issue":"5","key":"key2022082217162586900_ref076","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1080\/10576100490483679","article-title":"From words to action: exploring the relationship between a group's value References and its likelihood of engaging in terrorism","volume":"27","year":"2004","journal-title":"Studies in Conflict and Terrorism"},{"key":"key2022082217162586900_ref077","first-page":"1","article-title":"A survey on extremism analysis using natural language processing","year":"2021","journal-title":"ArXiv"},{"key":"key2022082217162586900_ref078","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1155\/2020\/1373087","article-title":"Prediction of future terrorist activities using deep neural networks","volume":"2020","year":"2020","journal-title":"Complexity"},{"key":"key2022082217162586900_ref079","doi-asserted-by":"publisher","first-page":"1292","DOI":"10.1109\/SSCI.2018.8628718","article-title":"BabelSenticNet: a commonsense reasoning framework for multilingual sentiment analysis","year":"2018"},{"volume-title":"Social Network Analysis: Methods and Applications (Structural Analysis in the Social Sciences)","year":"1994","key":"key2022082217162586900_ref080","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"key2022082217162586900_ref081","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-7091-0388-3","article-title":"Counterterrorism and open source intelligence","volume":"2","year":"2011","journal-title":"Social Networks"},{"issue":"10","key":"key2022082217162586900_ref082","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1400181.1400198","article-title":"The topology of dark networks","volume":"51","year":"2008","journal-title":"Communications of the ACM"},{"key":"key2022082217162586900_ref083","doi-asserted-by":"crossref","unstructured":"Xu, J., Chen, H., Zhou, Y. and Qin, J. (2006), \u201cOn the topology of the dark web of terrorist groups\u201d, in Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3975 LNCS, pp. 367-376, doi: 10.1007\/11760146_32.","DOI":"10.1007\/11760146_32"},{"article-title":"Discovering topics from dark websites","year":"2009","key":"key2022082217162586900_ref084","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925106"},{"first-page":"167","article-title":"Identifying dark web clusters with temporal coherence analysis","year":"2011","key":"key2022082217162586900_ref085"},{"key":"key2022082217162586900_ref086","doi-asserted-by":"crossref","unstructured":"Yilmazel, O., Symonenko, S., Balasubramanian, N. and Liddy, E.D. (2005), \u201cLeveraging one-class SVM and semantic analysis to detect anomalous content\u201d, in Lecture Notes in Computer Science, Vol. 3495, pp. 381-388, doi: 10.1007\/978-0-387-71613-8_19.","DOI":"10.1007\/11427995_32"},{"first-page":"464","article-title":"Topic detection based on keyword","year":"2011","key":"key2022082217162586900_ref087"},{"key":"key2022082217162586900_ref088","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/ISI.2010.5484774","article-title":"Developing a Dark Web collection and infrastructure for computational and social sciences","year":"2010"},{"issue":"5","key":"key2022082217162586900_ref089","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MIS.2005.96","article-title":"US domestic extremist groups on the web: link and content analysis","volume":"20","year":"2005","journal-title":"IEEE Intelligent Systems"},{"key":"key2022082217162586900_ref090","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/HICSS.2007.131","article-title":"Collection of U.S. extremist online forums: a web mining approach","year":"2007"},{"key":"key2022082217162586900_ref091","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/ISI.2012.6284095","article-title":"Scalable sentiment classification across multiple dark web forums","year":"2012"},{"first-page":"280","article-title":"Corpus-based Arabic stemming using N-grams","year":"2010","key":"key2022082217162586900_ref092"},{"first-page":"88","article-title":"Discovery of improvised explosive device content in the dark web","year":"2008","key":"key2022082217162586900_fur1"},{"key":"key2022082217162586900_fur2","doi-asserted-by":"crossref","unstructured":"Hsinchun, C. (2007), \u201cExploring extremism and terrorism on the web: the dark web project\u201d, in Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4430 LNCS, pp. 1-20, doi: 10.1007\/978-3-540-71549-8_1.","DOI":"10.1007\/978-3-540-71549-8_1"}],"container-title":["Data Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/DTA-07-2021-0177\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/DTA-07-2021-0177\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:15:14Z","timestamp":1753398914000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/dta\/article\/56\/4\/461-482\/44934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,6]]},"references-count":94,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,1,6]]},"published-print":{"date-parts":[[2022,8,23]]}},"alternative-id":["10.1108\/DTA-07-2021-0177"],"URL":"https:\/\/doi.org\/10.1108\/dta-07-2021-0177","relation":{},"ISSN":["2514-9288"],"issn-type":[{"type":"print","value":"2514-9288"}],"subject":[],"published":{"date-parts":[[2022,1,6]]}}}