{"id":"https://openalex.org/W2952732105","doi":"https://doi.org/10.1134/s0361768819030058","title":"Machine Learning Methods for Detecting and Monitoring Extremist Information on the Internet","display_name":"Machine Learning Methods for Detecting and Monitoring Extremist Information on the Internet","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2952732105","doi":"https://doi.org/10.1134/s0361768819030058","mag":"2952732105"},"language":"en","primary_location":{"id":"doi:10.1134/s0361768819030058","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768819030058","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003416394","display_name":"\u0418. \u0412. \u041c\u0430\u0448\u0435\u0447\u043a\u0438\u043d","orcid":"https://orcid.org/0000-0002-9837-585X"},"institutions":[{"id":"https://openalex.org/I19880235","display_name":"Lomonosov Moscow State University","ror":"https://ror.org/010pmpe69","country_code":"RU","type":"education","lineage":["https://openalex.org/I19880235"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"I. V. Mashechkin","raw_affiliation_strings":["Faculty of Computational Mathematics and Cybernetics, Moscow State University, 119899, Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computational Mathematics and Cybernetics, Moscow State University, 119899, Moscow, Russia","institution_ids":["https://openalex.org/I19880235"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074938669","display_name":"Mikhail Petrovskiy","orcid":"https://orcid.org/0000-0002-1236-398X"},"institutions":[{"id":"https://openalex.org/I19880235","display_name":"Lomonosov Moscow State University","ror":"https://ror.org/010pmpe69","country_code":"RU","type":"education","lineage":["https://openalex.org/I19880235"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"M. I. Petrovskiy","raw_affiliation_strings":["Faculty of Computational Mathematics and Cybernetics, Moscow State University, 119899, Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computational Mathematics and Cybernetics, Moscow State University, 119899, Moscow, Russia","institution_ids":["https://openalex.org/I19880235"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034027886","display_name":"D. V. Tsarev","orcid":"https://orcid.org/0000-0002-9041-2708"},"institutions":[{"id":"https://openalex.org/I19880235","display_name":"Lomonosov Moscow State University","ror":"https://ror.org/010pmpe69","country_code":"RU","type":"education","lineage":["https://openalex.org/I19880235"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"D. V. Tsarev","raw_affiliation_strings":["Faculty of Computational Mathematics and Cybernetics, Moscow State University, 119899, Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computational Mathematics and Cybernetics, Moscow State University, 119899, Moscow, Russia","institution_ids":["https://openalex.org/I19880235"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042333435","display_name":"Maxim Chikunov","orcid":null},"institutions":[{"id":"https://openalex.org/I19880235","display_name":"Lomonosov Moscow State University","ror":"https://ror.org/010pmpe69","country_code":"RU","type":"education","lineage":["https://openalex.org/I19880235"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"M. N. Chikunov","raw_affiliation_strings":["Faculty of Computational Mathematics and Cybernetics, Moscow State University, 119899, Moscow, Russia"],"affiliations":[{"raw_affiliation_string":"Faculty of Computational Mathematics and Cybernetics, Moscow State University, 119899, Moscow, Russia","institution_ids":["https://openalex.org/I19880235"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003416394"],"corresponding_institution_ids":["https://openalex.org/I19880235"],"apc_list":null,"apc_paid":null,"fwci":2.1719,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.87982388,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"45","issue":"3","first_page":"99","last_page":"115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13083","display_name":"Advanced Text Analysis Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8045293688774109},{"id":"https://openalex.org/keywords/dissemination","display_name":"Dissemination","score":0.779339075088501},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6927775740623474},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.4868178069591522},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4696243107318878},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4459022879600525},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.4351426064968109},{"id":"https://openalex.org/keywords/thematic-map","display_name":"Thematic map","score":0.4259573221206665},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3919258415699005},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32995909452438354},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3200371563434601},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08122199773788452}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8045293688774109},{"id":"https://openalex.org/C101780184","wikidata":"https://www.wikidata.org/wiki/Q840576","display_name":"Dissemination","level":2,"score":0.779339075088501},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6927775740623474},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.4868178069591522},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4696243107318878},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4459022879600525},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.4351426064968109},{"id":"https://openalex.org/C93692415","wikidata":"https://www.wikidata.org/wiki/Q1502030","display_name":"Thematic map","level":2,"score":0.4259573221206665},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3919258415699005},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32995909452438354},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3200371563434601},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08122199773788452},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C58640448","wikidata":"https://www.wikidata.org/wiki/Q42515","display_name":"Cartography","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1134/s0361768819030058","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768819030058","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W33249699","https://openalex.org/W60686164","https://openalex.org/W125674594","https://openalex.org/W152645600","https://openalex.org/W950821216","https://openalex.org/W1527483126","https://openalex.org/W1532325895","https://openalex.org/W1562316073","https://openalex.org/W1594031697","https://openalex.org/W1673310716","https://openalex.org/W1854214752","https://openalex.org/W1902027874","https://openalex.org/W1952772494","https://openalex.org/W1971788485","https://openalex.org/W1974172222","https://openalex.org/W1983578042","https://openalex.org/W1994472257","https://openalex.org/W2000528556","https://openalex.org/W2045783431","https://openalex.org/W2103901064","https://openalex.org/W2109785413","https://openalex.org/W2138621811","https://openalex.org/W2154268750","https://openalex.org/W2158295279","https://openalex.org/W2167004467","https://openalex.org/W2181347294","https://openalex.org/W2259716754","https://openalex.org/W2295598076","https://openalex.org/W2345719669","https://openalex.org/W2501069295","https://openalex.org/W2736010381","https://openalex.org/W2766966928","https://openalex.org/W2768348081","https://openalex.org/W2770603998","https://openalex.org/W2912934387","https://openalex.org/W2962814202","https://openalex.org/W3085162807","https://openalex.org/W3102476541","https://openalex.org/W3103643558","https://openalex.org/W4213009331","https://openalex.org/W4254873490","https://openalex.org/W6600335371","https://openalex.org/W6603056600","https://openalex.org/W6822976596"],"related_works":["https://openalex.org/W2291311298","https://openalex.org/W569815712","https://openalex.org/W2378021067","https://openalex.org/W2347703439","https://openalex.org/W4235672678","https://openalex.org/W2374084962","https://openalex.org/W1894594762","https://openalex.org/W2371027582","https://openalex.org/W1487740203","https://openalex.org/W1590627964"],"abstract_inverted_index":{"In":[0],"this":[1,53],"paper,":[2],"we":[3],"employ":[4],"machine":[5],"learning":[6],"methods":[7],"to":[8,123,132],"solve":[9],"the":[10,21,43,112,133],"problem":[11,24],"of":[12,37,45,89,99,105,114],"countering":[13],"terrorism":[14],"and":[15,30,48,56,68,87,97,141],"extremism":[16],"by":[17,108],"using":[18,109],"information":[19,36,58,83],"from":[20,103],"Internet.":[22],"This":[23],"involves":[25],"retrieving":[26],"electronic":[27],"messages,":[28],"documents,":[29],"web":[31],"resources":[32],"that":[33,51],"potentially":[34,125],"contain":[35],"terrorist":[38],"or":[39],"extremist":[40],"nature,":[41],"identifying":[42],"structure":[44,113],"user":[46],"groups":[47],"online":[49,106],"communities":[50,107],"disseminate":[52],"information,":[54],"monitoring":[55,73],"modeling":[57],"flows":[59],"in":[60,116],"these":[61,117],"communities,":[62,118],"as":[63,65,93,95],"well":[64,94],"assessing":[66],"threats":[67],"predicting":[69],"risks":[70],"based":[71],"on":[72,111],"results.":[74],"We":[75],"propose":[76],"some":[77],"original":[78],"language-independent":[79],"algorithms":[80],"for":[81],"pattern-based":[82],"retrieval,":[84],"thematic":[85],"modeling,":[86],"prediction":[88,98],"message":[90],"flow":[91],"characteristics,":[92],"assessment":[96],"potential":[100],"risk":[101],"coming":[102],"members":[104],"data":[110],"relations":[115],"which":[119],"makes":[120],"it":[121],"possible":[122],"detect":[124],"dangerous":[126],"users":[127],"even":[128],"without":[129],"full":[130],"access":[131],"content":[134],"they":[135],"distribute,":[136],"e.g.,":[137],"through":[138],"private":[139],"channels":[140],"chat":[142],"rooms.":[143]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
