Search
Full Listing
1715 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
VOX-Pol Blog | Computational Social Science: Understanding Terrorist Attacks on Twitter
View Abstract |
2016 | McGrath, E.C. and Buntain, C. | View Publisher |
VOX-Pol Blog | Bridging Computer Sciences and Social Sciences: The Search for Extremist Content Online
View Abstract |
2016 | Scrivens, R. | View Publisher |
VOX-Pol Blog | Some Recent Trends in the Use of the Internet/ICT for Terrorist Purposes – Part I
View Abstract |
2016 | ICT4Peace Foundation | View Publisher |
VOX-Pol Blog | America is ‘Dropping Cyberbombs’ – but How Do They Work?
View Abstract |
2016 | Forno, R. and Joshi, J. | View Publisher |
VOX-Pol Blog | My Islamic State Social Network
View Abstract |
2016 | Masi, A. | View Publisher |
VOX-Pol Blog | Countering Lone Wolf Terrorism: Weak Signals and Online Activities
View Abstract |
2016 | Kaati, L. and Johansson, F. | View Publisher |