Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = cyberwar

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 236 KB  
Article
Peaceful Settlement of Interstate Online Disputes
by Joanna Kulesza
Laws 2022, 11(3), 49; https://doi.org/10.3390/laws11030049 - 8 Jun 2022
Cited by 3 | Viewed by 5535
Abstract
This paper covers the existing international law toolbox on peaceful settlement of disputes and its application to online conflicts. It reiterates the existing measures of diplomatic and judicial measures to address differing positions of states and non-state actors as well as their applicability [...] Read more.
This paper covers the existing international law toolbox on peaceful settlement of disputes and its application to online conflicts. It reiterates the existing measures of diplomatic and judicial measures to address differing positions of states and non-state actors as well as their applicability for the unique online environment. Full article
(This article belongs to the Special Issue International Law as a Driver of Internet Governance)
19 pages, 1092 KB  
Article
Detection of Sensitive Data to Counter Global Terrorism
by Binod Kumar Adhikari, Wanli Zuo, Ramesh Maharjan, Xuming Han and Shining Liang
Appl. Sci. 2020, 10(1), 182; https://doi.org/10.3390/app10010182 - 25 Dec 2019
Cited by 5 | Viewed by 3258
Abstract
Global terrorism has created challenges to the criminal justice system due to its abnormal activities, which lead to financial loss, cyberwar, and cyber-crime. Therefore, it is a global challenge to monitor terrorist group activities by mining criminal information accurately from big data for [...] Read more.
Global terrorism has created challenges to the criminal justice system due to its abnormal activities, which lead to financial loss, cyberwar, and cyber-crime. Therefore, it is a global challenge to monitor terrorist group activities by mining criminal information accurately from big data for the estimation of potential risk at national and international levels. Many conventional methods of computation have successfully been implemented, but there is little or no literature to be found that solves these issues through the use of big data analytical tools and techniques. To fill this literature gap, this research is aimed at the determination of accurate criminal data from the huge mass of varieties of data using Hadoop clusters to support Social Justice Organizations in combating terrorist activities on a global scale. To achieve this goal, several algorithmic approaches, including parallelization, annotators and annotations, lemmatization, stop word Remover, term frequency and inverse document frequency, and singular value decomposition, were successfully implemented. The success of this work is empirically compared using the same hardware, software, and system configuration. Moreover, the efficacy of the experiment was tested with criminal data with respect to concepts and matching scores. Eventually, the experimental results showed that the proposed approach was able to expose criminal data with 100% accuracy, while matching of multiple criminal terms with documents had 80% accuracy; the performance of this method was also proved in multiple node clusters. Finally, the reported research creates new ways of thinking for security agencies in combating terrorism at global scale. Full article
Show Figures

Figure 1

20 pages, 2365 KB  
Article
An Empirical Approach for Extreme Behavior Identification through Tweets Using Machine Learning
by Waqas Sharif, Shahzad Mumtaz, Zubair Shafiq, Omer Riaz, Tenvir Ali, Mujtaba Husnain and Gyu Sang Choi
Appl. Sci. 2019, 9(18), 3723; https://doi.org/10.3390/app9183723 - 6 Sep 2019
Cited by 32 | Viewed by 6167
Abstract
The rise of social media has led to an increasing online cyber-war via hate and violent comments or speeches, and even slick videos that lead to the promotion of extremism and radicalization. An analysis to sense cyber-extreme content from microblogging sites, specifically Twitter, [...] Read more.
The rise of social media has led to an increasing online cyber-war via hate and violent comments or speeches, and even slick videos that lead to the promotion of extremism and radicalization. An analysis to sense cyber-extreme content from microblogging sites, specifically Twitter, is a challenging, and an evolving research area since it poses several challenges owing short, noisy, context-dependent, and dynamic nature content. The related tweets were crawled using query words and then carefully labelled into two classes: Extreme (having two sub-classes: pro-Afghanistan government and pro-Taliban) and Neutral. An Exploratory Data Analysis (EDA) using Principal Component Analysis (PCA), was performed for tweets data (having Term Frequency—Inverse Document Frequency (TF-IDF) features) to reduce a high-dimensional data space into a low-dimensional (usually 2-D or 3-D) space. PCA-based visualization has shown better cluster separation between two classes (extreme and neutral), whereas cluster separation, within sub-classes of extreme class, was not clear. The paper also discusses the pros and cons of applying PCA as an EDA in the context of textual data that is usually represented by a high-dimensional feature set. Furthermore, the classification algorithms like naïve Bayes’, K Nearest Neighbors (KNN), random forest, Support Vector Machine (SVM) and ensemble classification methods (with bagging and boosting), etc., were applied with PCA-based reduced features and with a complete set of features (TF-IDF features extracted from n-gram terms in the tweets). The analysis has shown that an SVM demonstrated an average accuracy of 84% compared with other classification models. It is pertinent to mention that this is the novel reported research work in the context of Afghanistan war zone for Twitter content analysis using machine learning methods. Full article
Show Figures

Figure 1

Back to TopTop