{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:56:32Z","timestamp":1775015792251,"version":"3.50.1"},"reference-count":46,"publisher":"Pleiades Publishing Ltd","issue":"3","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1134\/s0361768819030058","type":"journal-article","created":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T07:03:03Z","timestamp":1560236583000},"page":"99-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Machine Learning Methods for Detecting and Monitoring Extremist Information on the Internet"],"prefix":"10.1134","volume":"45","author":[{"given":"I. V.","family":"Mashechkin","sequence":"first","affiliation":[]},{"given":"M. I.","family":"Petrovskiy","sequence":"additional","affiliation":[]},{"given":"D. V.","family":"Tsarev","sequence":"additional","affiliation":[]},{"given":"M. N.","family":"Chikunov","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2019,6,11]]},"reference":[{"key":"7052_CR1","unstructured":"Why big data analytics holds the key to tackling the changing terror threat, J. Adv. Anal. Intell., 2015. http:\/\/ www.sas.com\/content\/dam\/SAS\/en_us\/doc\/other1\/ iq-q115.pdf."},{"key":"7052_CR2","unstructured":"Hankin, C., IDEAS factory \u2013 Detecting terrorist activities: Making sense. http:\/\/gow.epsrc.ac.uk\/NGBOViewGrant.aspx?GrantRef=EP\/H023135\/1."},{"key":"7052_CR3","doi-asserted-by":"crossref","unstructured":"Nizamani, S. et al., Modeling suspicious email detection using enhanced feature selection, 2013, preprint arXiv 1312.1971.","DOI":"10.7763\/IJMO.2012.V2.146"},{"key":"7052_CR4","volume-title":"Assessing and comparing data sources for terrorism research, Evidence-Based Counterterrorism Policy","author":"I.S. Sheehan","year":"2012","unstructured":"Sheehan, I.S., Assessing and comparing data sources for terrorism research, Evidence-Based Counterterrorism Policy, New York: Springer, 2012, vol. 3, pp. 13\u201340."},{"key":"7052_CR5","unstructured":"Berger, J.M. and Morgan, J., The ISIS Twitter Census, Brookings Project on US Relations with the Islamic World, 2015, no. 20."},{"key":"7052_CR6","unstructured":"IDEAS factory \u2013 Detecting terrorist activities: Making sense. http:\/\/www.slideserve.com\/fawzia\/detecting-terrorist-activities-making-sense."},{"key":"7052_CR7","unstructured":"Proc. Workshop Link Analysis, Counterterrorism, and Security, SIAM Int. Conf. Data Mining, California, 2005. http:\/\/research.cs.queensu.ca\/home\/skill."},{"key":"7052_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zeng, S., Fan, L., Dang, Y., Catherine, A., Larson, C.A., and Chen, H., Dark web forums portal: Searching and analyzing jihadist forums, Proc. IEEE Int. Conf. Intelligence and Security Informatics (ISI), Piscataway, USA, 2009, pp. 71\u201376.","DOI":"10.1109\/ISI.2009.5137274"},{"key":"7052_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A. Abbasi","year":"2005","unstructured":"Abbasi, A. and Chen, H., Applying authorship analysis to extremist-group web forum messages, IEEE Intell. Syst., 2005, vol. 20, pp. 67\u201375.","journal-title":"IEEE Intell. Syst."},{"key":"7052_CR10","doi-asserted-by":"crossref","unstructured":"R\u00edos, S.A. and Mu\u00f1oz, R., Dark web portal overlapping community detection based on topic models, Proc. ACM SIGKDD Workshop Intelligence and Security Informatics (ISI-KDD), New York, 2012.","DOI":"10.1145\/2331791.2331793"},{"key":"7052_CR11","series-title":"Nonnegative matrix factorization for interactive topic modeling and document clustering","volume-title":"Partitional Clustering Algorithms","author":"D. Kuang","year":"2015","unstructured":"Kuang, D., Choo, J., and Park, H., Nonnegative matrix factorization for interactive topic modeling and document clustering, in Partitional Clustering Algorithms, Springer, 2015, pp. 215\u2013243."},{"key":"7052_CR12","doi-asserted-by":"crossref","unstructured":"Tsarev, D.V., Petrovskiy, M.I., and Mashechkin, I.V., Using NMF-based text summarization to improve supervised and unsupervised classification, Proc. 11th IEEE Int. Conf. Application of Information and Communication Technologies, 2011, pp. 185\u2013189.","DOI":"10.1109\/HIS.2011.6122102"},{"key":"7052_CR13","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/asi.21249","volume":"61","author":"Y. Elovici","year":"2010","unstructured":"Elovici, Y., Shapira, B., Last, M., Zaafrany, O., Friedman, M., Schneider, M., and Kandel, A., Detection of access to terror-related web sites using an advanced terror detection system (ATDS), J. Am. Soc. Inf. Sci. Technol., 2010, vol. 61, pp. 405\u2013418.","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"7052_CR14","unstructured":"Agarwal, S. and Sureka, A., Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats, 2015, arXiv 1511.06858."},{"key":"7052_CR15","doi-asserted-by":"crossref","unstructured":"Badia, A. and Kantardzic, M., Link analysis tools for intelligence and counterterrorism, Lect. Notes Comput. Sci., vol. 3495, pp. 49\u201359.","DOI":"10.1007\/11427995_5"},{"key":"7052_CR16","doi-asserted-by":"crossref","unstructured":"Ferrara, E., Wang, W.-Q., Varol, O., Flammini, A., and Galstyan, A., Predicting online extremism, content adopters, and interaction reciprocity, Proc. Int. Conf. Social Informatics, 2016, pp. 22\u201339.","DOI":"10.1007\/978-3-319-47874-6_3"},{"key":"7052_CR17","doi-asserted-by":"crossref","unstructured":"R\u00edos, S.A. and Mu\u00f1oz, R., Dark web portal overlapping community detection based on topic models, Proc. ACM SIGKDD Workshop Intelligence and Security Informatics (ISI-KDD), New York, 2012.","DOI":"10.1145\/2331791.2331793"},{"key":"7052_CR18","doi-asserted-by":"crossref","unstructured":"Toure, I. and Gangopadhyay, A., Analyzing terror attacks using latent semantic indexing, Proc. IEEE Int. Conf. Technologies for Homeland Security (HST), 2013, pp. 334\u2013337.","DOI":"10.1109\/THS.2013.6699024"},{"key":"7052_CR19","doi-asserted-by":"publisher","first-page":"2461","DOI":"10.1109\/TIFS.2015.2464775","volume":"10","author":"J.R. Scanlon","year":"2015","unstructured":"Scanlon, J.R. and Gerber, M.S., Forecasting violent extremist cyber recruitment, IEEE Trans. Inf. Forensics Secur., 2015, vol. 10, no. 11, pp. 2461\u20132470.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7052_CR20","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1964897.1964917","volume":"12","author":"G. L\u2019Huillier","year":"2011","unstructured":"L\u2019Huillier, G., Alvarez, H., R\u00edos, S.A., and Aguilera, F., Topic-based social network analysis for virtual communities of interests in the dark web, SIGKDD Explor. Newsl., 2011, vol. 12, no. 2, pp. 66\u201373.","journal-title":"SIGKDD Explor. Newsl."},{"key":"7052_CR21","doi-asserted-by":"crossref","unstructured":"Yang, L., Liu, F., Kizza, J.M., and Ege, R.K., Discovering topics from dark websites, Proc. IEEE Symp. Computational Intelligence in Cyber Security (CICS), 2009, pp. 175\u2013179.","DOI":"10.1109\/CICYBS.2009.4925106"},{"key":"7052_CR22","volume-title":"Pattern based information retrieval approach to discover extremist information on the Internet, Mining Intelligence and Knowledge Exploration","author":"M. Petrovskiy","year":"2017","unstructured":"Petrovskiy, M., Tsarev, D., and Pospelova, I., Pattern based information retrieval approach to discover extremist information on the Internet, Mining Intelligence and Knowledge Exploration, Ghosh, A., Pal, R., and Prasath, R., Eds., Springer, 2017."},{"key":"7052_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"C.D. Manning","year":"2008","unstructured":"Manning, C.D. et al., Introduction to Information Retrieval, Cambridge University Press, 2008, vol. 1."},{"key":"7052_CR24","doi-asserted-by":"publisher","DOI":"10.2172\/5698","volume-title":"New term weighting formulas for the vector space method in information retrieval","author":"E. Chisholm","year":"1999","unstructured":"Chisholm, E. and Kolda, T.G., New term weighting formulas for the vector space method in information retrieval, Computer Science and Mathematics Division, Oak Ridge National Laboratory, 1999."},{"key":"7052_CR25","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1037\/0033-295X.104.2.211","volume":"104","author":"T.K. Landauer","year":"1997","unstructured":"Landauer, T.K. and Dumais, S.T., A solution to Plato\u2019s problem: The latent semantic analysis theory of acquisition, induction, and representation of knowledge, Psychol. Rev., 1997, vol. 104, no. 2, p. 211.","journal-title":"Psychol. Rev."},{"key":"7052_CR26","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1038\/44565","volume":"401","author":"D.D. Lee","year":"1999","unstructured":"Lee, D.D. and Seung, H.S., Learning the parts of objects by non-negative matrix factorization, Nature, 1999, vol. 401, no. 6755, pp. 788\u2013791.","journal-title":"Nature"},{"key":"7052_CR27","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1134\/S0361768811060041","volume":"37","author":"D.V. Tsarev","year":"2011","unstructured":"Tsarev, D.V., Petrovskiy, M.I., Mashechkin, I.V., and Popov, D.S., Automatic text summarization using latent semantic analysis, Program. Comput. Software, 2011, vol. 37, no. 6, pp. 299\u2013305.","journal-title":"Program. Comput. Software"},{"key":"7052_CR28","volume-title":"Text summarization and singular value decomposition, Advances in Information Systems","author":"J. Steinberger","year":"2005","unstructured":"Steinberger, J. and Je\u017eek, K., Text summarization and singular value decomposition, Advances in Information Systems, Berlin: Springer, 2005, pp. 245\u2013254."},{"key":"7052_CR29","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., and Xu, X., A density-based algorithm for discovering clusters in large spatial databases with noise, Proc. 2nd Int. Conf. Knowledge Discovery and Data Mining (KDD), 1996, pp. 226\u2013231."},{"key":"7052_CR30","unstructured":"Levenshtein, V.I., Binary codes with correction of fallouts, insertions, and substitutions of characters, Dokl. Akad. Nauk SSSR (Proc. Acad. Sci. USSR), 1965, vol.\u00a0163, no. 4, pp. 845\u2013848."},{"key":"7052_CR31","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1111\/1467-9868.00125","volume":"60","author":"C.M. Hurvich","year":"1998","unstructured":"Hurvich, C.M., Simonoff, J.S., and Tsai, C.L., Smoothing parameter selection in nonparametric regression using an improved Akaike information criterion, J. R. Stat. Soc. B, 1998, vol. 60, pp. 271\u2013293.","journal-title":"J. R. Stat. Soc. B"},{"key":"7052_CR32","unstructured":"Salvador, S. and Chan, P., FastDTW: Toward accurate dynamic time warping in linear time and space, Proc. KDD Workshop Mining Temporal and Sequential Data, 2004, pp. 70\u201380."},{"key":"7052_CR33","unstructured":"Notation for ARIMA models, Time Series Forecasting System, SAS Institute."},{"key":"7052_CR34","doi-asserted-by":"crossref","unstructured":"Shehabat, A., Mitew, T., and Alzoubi, Y., Encrypted jihad: Investigating the role of Telegram app in lone wolf attacks in the West, J. Strategic Secur., 2017, no. 3, pp. 27\u201353.","DOI":"10.5038\/1944-0472.10.3.1604"},{"key":"7052_CR35","volume-title":"The pagerank citation ranking: Bringing order to the web","author":"L. Page","year":"1999","unstructured":"Page, L., Brin, S., Motwani, R., and Winograd, T., The pagerank citation ranking: Bringing order to the web, Stanford InfoLab, 1999."},{"key":"7052_CR36","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1145\/324133.324140","volume":"46","author":"J.M. Kleinberg","year":"1999","unstructured":"Kleinberg, J.M., Authoritative sources in a hyperlinked environment, J. ACM, 1999, vol. 46, nos. 5\u20137, pp.\u00a0604\u2013632.","journal-title":"J. ACM"},{"key":"7052_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications (Structural Analysis in the Social Sciences)","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S. and Faust, K., Social Network Analysis: Methods and Applications (Structural Analysis in the Social Sciences), Cambridge University Press, 1994, 1st\u00a0ed."},{"key":"7052_CR38","doi-asserted-by":"crossref","unstructured":"Chen, T. and Guestrin, C., XGBoost: A scalable tree boosting system, Proc. 22nd ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, 2016, pp. 785\u2013794.","DOI":"10.1145\/2939672.2939785"},{"key":"7052_CR39","unstructured":"Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W., Ma, W., Ye, Q., and Liu, T.Y., LightGBM: A highly efficient gradient boosting decision tree, Adv. Neural Inf. Process. Syst., 2017, pp. 3149\u20133157."},{"key":"7052_CR40","unstructured":"Baldi, P., Autoencoders, unsupervised learning, and deep architectures, Proc. ICML Workshop Unsupervised and Transfer Learning, 2012, pp. 37\u201349."},{"key":"7052_CR41","unstructured":"The 20 Newsgroups data set. http:\/\/people.csail.mit. edu\/jrennie\/20Newsgroups."},{"key":"7052_CR42","unstructured":"Kaggle \u201cHow ISIS uses Twitter\u201d dataset. http:\/\/www. kaggle.com\/fifthtribe\/how-isis-uses-twitter."},{"key":"7052_CR43","unstructured":"Kaggle \u201cISIS religious texts\u201d dataset. http:\/\/www.kaggle.com\/fifthtribe\/isis-religious-texts."},{"key":"7052_CR44","volume-title":"Classification and regression trees","author":"L. Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., and Stone, C.J., Classification and regression trees, Monterey: Wadsworth & Brooks\/Cole Advanced Books & Software, 1984."},{"key":"7052_CR45","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1023\/A:1018054314350","volume":"24","author":"L. Breiman","year":"1996","unstructured":"Breiman, L., Bagging predictors, Mach. Learn., 1996, vol. 24, no. 2, pp. 123\u2013140.","journal-title":"Mach. Learn."},{"key":"7052_CR46","doi-asserted-by":"crossref","unstructured":"Hutter, F., Hoos, H., and Leyton-Brown, K., Sequential model-based optimization for general algorithm configuration, Learn. Intell. Optim., 2011, pp. 507\u2013523.","DOI":"10.1007\/978-3-642-25566-3_40"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768819030058.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768819030058","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768819030058.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:31:00Z","timestamp":1775010660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768819030058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["7052"],"URL":"https:\/\/doi.org\/10.1134\/s0361768819030058","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5]]},"assertion":[{"value":"15 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}