![](https://voxpol.eu/wp-content/uploads/2023/09/hero-library@2x-100-scaled.jpg)
Search
Full Listing
1651 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
|
Computational Social Science: Understanding Terrorist Attacks on Twitter
View Abstract |
2016 | McGrath, E.C. and Buntain, C. | View Publisher |
|
Bridging Computer Sciences and Social Sciences: The Search for Extremist Content Online
View Abstract |
2016 | Scrivens, R. | View Publisher |
|
Some Recent Trends in the Use of the Internet/ICT for Terrorist Purposes – Part I
View Abstract |
2016 | ICT4Peace Foundation | View Publisher |
|
America is ‘Dropping Cyberbombs’ – but How Do They Work?
View Abstract |
2016 | Forno, R. and Joshi, J. | View Publisher |
|
My Islamic State Social Network
View Abstract |
2016 | Masi, A. | View Publisher |
|
Countering Lone Wolf Terrorism: Weak Signals and Online Activities
View Abstract |
2016 | Kaati, L. and Johansson, F. | View Publisher |