{"id":"https://openalex.org/W2904076158","doi":"https://doi.org/10.1109/kse.2018.8573353","title":"Modeling The Causes Of Terrorism From Media News: An Innovative Framework Connecting Impactful Events With Terror Incidents","display_name":"Modeling The Causes Of Terrorism From Media News: An Innovative Framework Connecting Impactful Events With Terror Incidents","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2904076158","doi":"https://doi.org/10.1109/kse.2018.8573353","mag":"2904076158"},"language":"en","primary_location":{"id":"doi:10.1109/kse.2018.8573353","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse.2018.8573353","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 10th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001952199","display_name":"Truong Son Pham","orcid":null},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Truong Son Pham","raw_affiliation_strings":["Le Quy Don Technical University Faculty of Information Technology, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University Faculty of Information Technology, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068112879","display_name":"Tuan-Hao Hoang","orcid":"https://orcid.org/0000-0001-9742-2370"},"institutions":[{"id":"https://openalex.org/I131359167","display_name":"Le Quy Don Technical University","ror":"https://ror.org/04wgyjv21","country_code":"VN","type":"education","lineage":["https://openalex.org/I131359167"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Tuan-Hao Hoang","raw_affiliation_strings":["Le Quy Don Technical University Faculty of Information Technology, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Le Quy Don Technical University Faculty of Information Technology, Hanoi, Vietnam","institution_ids":["https://openalex.org/I131359167"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001952199"],"corresponding_institution_ids":["https://openalex.org/I131359167"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1724785,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":null,"first_page":"364","last_page":"369"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9420999884605408,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9420999884605408,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9415000081062317,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9243000149726868,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.745265543460846},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7016617655754089},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.5972057580947876},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5837684273719788},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5200181007385254},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5131098031997681},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.5065897703170776},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.45634329319000244},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32339638471603394},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22672110795974731},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.17540615797042847},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15077239274978638},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.0952623188495636}],"concepts":[{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.745265543460846},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7016617655754089},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.5972057580947876},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5837684273719788},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5200181007385254},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5131098031997681},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.5065897703170776},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.45634329319000244},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32339638471603394},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22672110795974731},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.17540615797042847},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15077239274978638},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0952623188495636}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kse.2018.8573353","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse.2018.8573353","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 10th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1985697096","https://openalex.org/W2034778365","https://openalex.org/W2074701321","https://openalex.org/W2163588476","https://openalex.org/W2399947799","https://openalex.org/W2501302514","https://openalex.org/W2588794268","https://openalex.org/W3015532885","https://openalex.org/W6654243350","https://openalex.org/W6691692469","https://openalex.org/W6775568307"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W569815712","https://openalex.org/W4235672678","https://openalex.org/W1894594762","https://openalex.org/W1487740203","https://openalex.org/W1590627964","https://openalex.org/W1982644550","https://openalex.org/W1973338178","https://openalex.org/W2103198501","https://openalex.org/W2366248361"],"abstract_inverted_index":{"Terrorism":[0],"has":[1,149],"become":[2],"an":[3,35,76],"increasingly":[4],"relevant":[5],"issue":[6],"accounting":[7],"for":[8,163],"significant":[9],"social,":[10],"economic":[11,183],"and":[12,58,64,84,130],"political":[13,179],"impact.":[14],"Due":[15],"to":[16,41,115,122,143,171],"powerful":[17],"media":[18],"coverage":[19],"on":[20],"the":[21,44,94,99,107,126,144,161,176],"subject,":[22],"a":[23,47,70,116,123,140],"lot":[24],"of":[25,49,90,103,109,120,146,168,178],"information":[26],"is":[27],"now":[28],"publicly":[29],"available,":[30],"although":[31],"normally":[32],"found":[33,97],"in":[34,98,106,136,154],"unstructured":[36],"form.":[37],"This":[38],"research":[39],"aims":[40],"better":[42],"understand":[43],"connection":[45],"between":[46,128],"collection":[48],"impactful":[50],"events,":[51],"such":[52],"as":[53],"external":[54],"or":[55,182],"internal":[56],"conflicts":[57],"military":[59],"operations,":[60],"with":[61,75,81],"terror":[62,131],"events":[63],"its":[65],"motivations.":[66],"To":[67],"this":[68,137,158],"end,":[69],"framework":[71],"was":[72],"devised,":[73],"starting":[74],"online":[77],"news":[78],"scraper,":[79],"coupled":[80],"machine":[82],"learning":[83],"natural":[85],"language":[86],"processing":[87],"techniques,":[88],"capable":[89,119,167],"clustering":[91],"keywords":[92],"into":[93],"main":[95],"topics":[96,129],"news.":[100],"The":[101,133],"results":[102],"these":[104],"algorithms,":[105],"form":[108],"structured":[110],"data,":[111],"were":[112],"later":[113],"fed":[114],"modeling":[117],"technique":[118],"finding,":[121],"certain":[124],"degree,":[125],"connections":[127],"events.":[132],"approach":[134],"presented":[135],"work":[138],"adopts":[139],"perspective":[141],"that,":[142],"best":[145],"our":[147],"knowledge,":[148],"not":[150],"been":[151],"previously":[152],"seen":[153],"specialized":[155],"literature.":[156],"Furthermore,":[157],"methodology":[159],"constitutes":[160],"groundwork":[162],"open":[164],"source":[165],"intelligence,":[166],"being":[169],"applied":[170],"various":[172],"similar":[173],"domains":[174],"like":[175],"prediction":[177],"risk":[180,184],"index":[181],"index.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
