Like My Terrorist Site? Pin It!
Abstract:
Violent Extremist Organizations (VEOs) use the Internet to disseminate information and recruit new members. Their delivery mechanisms include social media, web forums, and custom-built websites. This paper presents a novel approach for analysing the websites of VEOs that creates a graph of network requests to third-party domains. Analysis of this graph suggests a binary classifier for the intended audience of the website.
AUTHORS
College of Information Science and Technology University of Nebraska, Omaha
USA
Eric Edens studied Computer Science at the University of Nebraska at Omaha and received his MA from Claremont Graduate and his BA from Pomona College. His research interests include formal languages, code generation, and virtual machine design. Mr. Edens is now a software engineer in Seattle, Washington.
School of Interdisciplinary Informatics University of Nebraska-Omaha
Omaha, NE, United States
William R. Mahoney, Ph.D. is a professor in the College of Information Science and Technology at the University of Nebraska at Omaha. Dr. Mahoney is also a principal investigator for the Scholarship for Service program–a student aid program for cybersecurity students managed by the National Science Foundation. His research areas include code obfuscation, reverse engineering and anti-reverse engineering techniques, as well as vulnerability analysis, particularly with respect to critical infrastructure equipment. He regularly teaches in both the Cybersecurity and Computer Science areas and is a reviewer for several information warfare and cybersecurity publications and conferences.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive