Terrorism Informatics Resources
I used Terrorism Informatics to create this list.
Topic maps are relevant to terrorism informatics but require an understanding of the lingo and concerns of that community.
This listing of researchers is a first step in that direction.
Abbasi, Ahmed Detecting fake websites, social network analysis, stylometrics, coherence analysis.
Ashish, Naveen Information extraction, situational representation, integrity constraints.
Balasubramanian, Niranjan Query-based aspect models, syntactic query models, text categorization.
Best, Clive Open source intelligence, automating event extraction, geocoding multilingual texts.
Burgoon, Judee. K Deception detection.
Chang, Kuiyu Sequential query prediction, visualizing heterogeneous semantic networks, anticipatory event detection.
Chau, Michael Search engine development tools, blog mining framework, specialized search engines.
Chen, Hsinchun visualizing social networks, recommendation as link prediction, online news monitoring.
Elovici, Yuval multidimensional suppression for K-anonymity, Advanced Terror Detection System (ATDS), malware filtering devices.
Fienberg, Stephen. E Matrix masking, statistical network models, distributed databases.
Friedman, Menahem Crisp and fuzzy-based cosine clustering methodology, data mining, software testing.
Hu, Xiaohua Semantic-based association, data mining in bioinformatics, document clustering.
Kalashnikov, Dmitri Multiple entity resolution systems, situational awareness, indexing.
Kandel, Abraham Mining dynamic data streams, applied pattern recognition, web document classification.
Kruse, W. John Collaboration success, deception detection.
Last, Mark Projective sampling, applied pattern recognition, web terrorist content.
Liddy, Elizabeth D. Text categorization, standards alignment, perception.
Lim, Ee-Peng TwitterRank, classification performance for categories, trust relationships.
Mehrotra, Sharad Information extraction, speech annotation of images, privacy preservation.
Meservy, Thomas O. Collaborative success, deception detection.
Nunamaker, Jay F. Jr. Effective virtual teamwork, deception detection.
Qin, Jialun Search engine development tools, Dark web, web mining.
Reid, Edna Business stakeholder analyzer, Dark web, content analysis.
Sageman, Marc Social networks – fractal views, terrorist social networks.
Schneider, Moti Intelligent data analysis, fuzzy logic.
Shapira, Bracha Multidimensional suppression for K-anonymity, information filtering, social recommender systems.
Skillicorn, D.B. Adversarial knowledge discovery, dynamic streaming random forests, subverting prediction.
Smyth, Padhraic Author-topic models, prediction precision, combining conceptual hierarchies.
Sycara, Katia P. Belief sharing in multi-agent systems, randomized information sharing, graphs with heterogeneous agents.
Venkatasubramanian, Nalini Content space representation, privacy-preserving event detection, situational representation.
Wu, Daniel Duanqing Hierarchical random graphs, mixed language model, data mining.
Xu, Jennifer J. Blog mining, typology of dark networks, automated criminal link analysis.
Xu, Shuting Privacy preserving churn prediction, clustering blog documents, data distortion.
Yilmazel, Ozgur Information retrieval systems, Turkish text retrieval, semantic analysis.
Zhang, Jun Micro-blogging, scatter-search algorithm, merging textual knowledge.
Zhang, Xiaodan Semantic-based association, document clustering, text summarization.
Zhou, Xiaohua Lightweight local context analysis, automated digital reference services, topic signature mapping.
Zhou, Yilu Search engine development tools, search engines, terror campaigns.