<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Invited keynote on IOT4SAFE 2020: Semantic Web Technologies in Fighting Crime and Terrorism: The CONNEXIONs Approach</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Alexandros</forename><surname>Koufakis</surname></persName>
							<email>akoufakis@iti.gr</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Information Technologies Institute</orgName>
								<orgName type="department" key="dep2">Centre for Research and Technology Hellas</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Despoina</forename><surname>Chatzakou</surname></persName>
							<email>dchatzakou@iti.gr</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Information Technologies Institute</orgName>
								<orgName type="department" key="dep2">Centre for Research and Technology Hellas</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Georgios</forename><surname>Meditskos</surname></persName>
							<email>gmeditsk@iti.gr</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Information Technologies Institute</orgName>
								<orgName type="department" key="dep2">Centre for Research and Technology Hellas</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Theodora</forename><surname>Tsikrika</surname></persName>
							<email>theodora.tsikrika@iti.gr</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Information Technologies Institute</orgName>
								<orgName type="department" key="dep2">Centre for Research and Technology Hellas</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Stefanos</forename><surname>Vrochidis</surname></persName>
							<email>stefanos@iti.gr</email>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Information Technologies Institute</orgName>
								<orgName type="department" key="dep2">Centre for Research and Technology Hellas</orgName>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ioannis</forename><surname>Kompatsiaris</surname></persName>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">Information Technologies Institute</orgName>
								<orgName type="department" key="dep2">Centre for Research and Technology Hellas</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Invited keynote on IOT4SAFE 2020: Semantic Web Technologies in Fighting Crime and Terrorism: The CONNEXIONs Approach</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DC9572AD7462F2CCC4E17EB22FAD30D9</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T00:21+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Semantic structures</term>
					<term>Ontologies</term>
					<term>Semantic Integration</term>
					<term>Semantic Enrichment</term>
					<term>Semantic Reasoning</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Ontologies play a key role in the Semantic Web, providing the machine-interpretable semantic vocabulary and serving as the knowledge representation and exchange vehicle. On top of ontologies, various functionalities can be supported, such as semantic integration, enrichment and reasoning to either further enhance or enrich them with additional information, or to deduct implicit knowledge out of the already annotated information. This paper presents a holistic semantic model employed within the CONNEXIONs EU-funded project that is aimed at semantically representing and reasoning about all pertinent notions derived from the analysis of high volumes of heterogeneous data with the goal to ultimately improve the capabilities of Law Enforcement Agencies in their fight against crime and terrorism. The proposed model enables the compound of various important aspects that resolve around several sources of information considered important in this context, including online sources that are often adversely exploited, as well information produced by Internet of Thing devices, such as sensors and cameras.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The continuous evolution of serious and organized crime and terrorism poses significant challenges to Law Enforcement Agencies (LEAs) that need to be equipped with effective and efficient tools and solutions for the detection, prediction, investigation, and ultimately prevention of such activities. One particular challenge highlighted by the recent terrorist attacks in many European cities 1 is the growing role that online channels (e.g., Surface, Deep, and Dark Web and social media platforms) play towards enabling and facilitating terrorist causes, including radicalization, recruitment, and training, as well as the planning and coordination of terrorist attacks <ref type="bibr" target="#b13">[14]</ref>. Thus, there is a need for LEAs to monitor online sources so as to be in a position to detect, as early as possible, criminal and/or terrorist activities, in order to prevent and mitigate potential threats.</p><p>Moreover, during specific missions and operations undertaken by LEAs, it is of high importance for police officers (particularly those on the field) to be constantly aware of the overall situation, and in particular of any potential threats. For instance, when policing large-scale events, such as music festivals, it would be extremely important for LEA personnel to be aware of any suspicious activities taking place, since such information would allow them to act faster and possibly prevent a potential terrorist action. For instance, the monitoring and analysis of data produced from Internet of Things (IoT) devices, such as wearable and fixed sensors and cameras, could also assist towards this direction.</p><p>Therefore, the abundance of information produced from both IoT devices and online sources necessitates the development of methods and tools for efficiently representing processed and analyzed data based on a uniform modeling process. To this end, semantic structures (i.e., ontologies) can be utilized, which permit the semantic representation of all pertinent knowledge derived from the already analyzed data. Overall, ontologies permit the understanding, sharing, and reuse of knowledge across different systems, while also supporting various semantic operations, such as semantic integration, enrichment and reasoning, to either further enhance the available information or to infer logical conclusions out of the already semantically annotated information.</p><p>In this paper, we discuss how Semantic Web technologies can be used to effectively capture, interpret, and reason about information that revolves around criminal and terrorist activities, including evidence obtained both from online environments and also from sensors. The proposed approach has been developed within the context of the CONNEXIONs EU-funded project (https://www. connexions-project.eu/) and consists of an ontology and a range of semanticbased functionalities. The overall objective is to provide intelligence to LEAs that would allow them to improve their ability to analyze evidence and investigate crime and terrorism with the maximum possible effectiveness and efficiency. The next step constitutes the integration and correlation of such information through advanced methods (e.g., through ontologies and their supported functionalities) to finally deliver pertinent information in an interactive manner to a variety of end users, such as field officers, investigators, and analysts. To this end, immersive environments (such as virtual and augmented reality) are also considered for the delivery of such information in order to improve situational awareness, investigation, and training capabilities.</p><p>It is evident from the above that the establishment of a well-defined data representation framework is of high importance, since it permits the capturing of several modalities and thus enables the subsequent application of a variety of analytics tools. The following sections describe the knowledge structures of the CONNEXIONs ontology and the reasoning services that allow the deduction of logical inferences out of the already semantically annotated information (i.e., facts and relationships).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The CONNEXIONs Ontology</head><p>Ontologies are the starting point and the key component of Semantic Web technologies as they model the pertinent knowledge of any studied system. One definition states "an ontology is a formal, explicit specification of a shared conceptualization that is characterized by high semantic expressiveness required for increased complexity" <ref type="bibr" target="#b3">[4]</ref>. In short, they provide the mold for the available data in order to build a homogeneous data repository that can effectively utilize Semantic Web technologies. In fact, such technologies are powerful tools towards enhancing decision support and reasoning capabilities towards fighting crime and terrorism. This section first discusses related work (Section 3.1), then outlines the approach adopted by the CONNEXIONs Ontology (Section 3.2), and finally presents the conceptualization of the proposed ontology (Section 3.3).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Related Work</head><p>Turner <ref type="bibr" target="#b11">[12]</ref> proposed the Adversary-Intent-Target (AIT) ontology, namely a model for semantically representing adversary groups and their intentions, a classification of their weapons and attack types, and the relationship between the outcomes of an attack and the various recognized intentions of the adversary group. Another prominent approach is the work by Mannes and Golbeck <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>, which proposes an ontology for representing terrorist activity and addresses the key issues the authors encountered during the development of the ontology, mostly revolving around how sequences of events can be described, and also representing the social networks that underpin terrorist organizations.</p><p>Moreover, Benahmed et al. <ref type="bibr" target="#b0">[1]</ref> proposed an ontology for automating the characterization and the classification of terrorist threats at early stages, aiming at a more efficient threat mitigation, while Galjano et al. <ref type="bibr" target="#b4">[5]</ref> focused more on monitoring subjects and objects (targets) of potential interest in an effort to monitor terrorist threats. In addition, an ontology for uncovering terrorism-related hidden semantic associations, which was the result of a knowledge fusion from several existing ontologies and open knowledge systems on the Web, was proposed by Chmielewski et al. <ref type="bibr" target="#b2">[3]</ref>.</p><p>Other relevant approaches include the one by Inyaem et al. <ref type="bibr" target="#b6">[7]</ref>, where a fuzzy ontology (whereby relationships have degrees of membership) for representing terrorism events was proposed. Also, Najgebauer et al. <ref type="bibr" target="#b9">[10]</ref> developed a terrorism ontology for representing terrorist threat indications and facilitating the early detection of terrorist action preparation activities, constituting the backbone of an early warning system. Finally, Veerasamy et al. <ref type="bibr" target="#b12">[13]</ref> presented an ontology specifically developed for cyberterrorism, which is aimed at identifying whether a cyber-event can be classified as a cyberterrorist attack or a support activity, and provides a rich semantic representation of underlying relationships, interactions, and influencing factors.</p><p>The main limitation of the ontologies presented above lies in their narrow focus, which typically revolves around criminal/terrorist groups and their intentions, attacks, and impacts. Though absolutely essential, these aspects constitute only a fragment of the knowledge required during the detection, prediction, and investigation of criminal and terrorist activities. The CONNEXIONs ontology, on the other hand, aims to provide a more holistic semantic model, covering various additional aspects besides the aforementioned ones, such as online behaviors, knowledge derived from the analysis of sensors-based data, as well as spatiotemporal information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">The CONNEXIONs Approach</head><p>The CONNEXIONs ontology aims to provide the means to model the relevant knowledge regarding the studied system, in order to enhance the decision support and reasoning capabilities for fighting crime and terrorism.</p><p>One important feature of the ontologies is their interoperability which is ensured by using common ontologies (and vocabularies) or by semantically mapping entities between different ontologies. Interoperability enables sharing knowledge from different repositories that are expressed using the same semantics. In practice, it is beneficial to reuse ontologies and vocabularies that are established provided they meet the particular needs.</p><p>Specifically, the CONNEXIONs ontology reuses the following resources about spatial information and multimedia modeling:</p><p>1. The Basic Geo (WGS84 lat/long) Vocabulary <ref type="bibr" target="#b1">[2]</ref> is a lightweight ontology (formalized in OWL 2) that follows the specification of world geodesic system (revision 1984) for the representation of coordinates and altitude. This vocabulary directly supports only points in space that are defined by their coordinates. However, it can be extended to manipulate aggregations of points and subsequently form complex shapes. 2. The SIMMO (Socially Interconnected MultiMedia-enriched Objects) <ref type="bibr" target="#b10">[11]</ref> is a model for expressing multimodal data in a social context with rich context.</p><p>In particular, it focuses on their structure, interconnections and provenance</p><p>Copyright c 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). which renders it highly useful and versatile in expressing online user activity and media. In order for the model to be imported in the CONNEXIONs ontology it was first ported as an OWL 2 ontology.</p><p>The CONNEXIONs ontology is formalized in OWL <ref type="bibr" target="#b5">[6]</ref>, which is recommended by W3C and is designed to model complex knowledge systems. OWL has rich expressivity and can capture intricate relationships between entities. Moreover, OWL is logic-based language and supports implicit knowledge extraction and consistency verification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">The CONNEXIONs Ontology Conceptualization</head><p>The specification of the is the first step towards exploiting semantic web technologies towards a reasoning framework that will aid the LEAs on crime event situations. In the following section the most important classes and properties of the CONNEXIONs ontology are presented (see also Figure <ref type="figure" target="#fig_0">1</ref>). The class Event represents a situation that takes place and is of relevance to the system; e.g., a social event, a crime or even an online event. This situation typically involves multiple entities that have varying roles and affect differently the event. Such entities with active role within the frame of the event are called Agents and their main characteristic is that they have the ability to affect the Event. Agents may be living beings (e.g., Persons) or web agents, namely, software entities that act on the Web (e.g., User Account). Additionally, Agents can perform activities that carry some significance for the event (the Activity class). Finally, agents might possess Physical Objects, such as sensors (Sensing Device). Physical objects can be carried or be stationary, where in both cases, the specification of their location is important (has location property).</p><p>Copyright c 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</p><p>Beyond the agents and the physical objects present at an event, online activity can provide a more complete view over the event. To this end, the ontology adopts the extended version of SIMMO model to express such online activities. In particular, the classes User Account and Web Domain are used to identify relevant online activities. In order to represent the activities and the artefacts posted online, the class simmo:Document is used in order to model multimodal and complex entities. Such documents can range from posts that contain a single text passage to web pages that contain multiple images and videos. Moreover, documents can reference (simmo:reference) other documents, or can be associated with other entities by a shared topic. User accounts are one of the more important contributors to the creation of documents and they can have relationships between them, e.g., a user account can be affiliated with others. Relationships between user accounts and documents are mainly expressed via the property simmo:contribution to express the creation of the document by the user.</p><p>Spatial information is crucial towards a complete understanding of a situation, especially in case of real world applications. For purely spatial information, the class Location is used that represents spatial information by reusing the Basic Geo Vocabulary that represents the locations as points in space. However, in time sensitive situations the spatial configurations are often fast changing, thus, a static spatial information is not sufficient. For this reason, we proposed the combination of temporal and spatial information using the Spatio-Temporal Context class (Figure <ref type="figure" target="#fig_1">2</ref>), which is responsible for keeping a history of locations and their correspondent times. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Semantic Operations</head><p>Ontologies define a set of entities and the relationships between them at a theoretical level. However, in order to have practical applications these need to be emanated as a data structure that adheres to the semantic model defined by the Copyright c 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). ontology. In the context of the CONNEXIONs project, the data structure that holds the semantic information is an RDF database and comprises a Knowledge Base (KB) with an interface that utilizes the SPARQL (SPARQL Protocol and RDF Query Language) query language in order to insert and retrieve data. SPARQL is a semantic query language that operates on RDF data (W3C standard) and one of key technologies of the Semantic Web. At a higher logical level, the operations implemented with SPARQL are semantic integration, enrichment and reasoning. The first two are responsible for inserting knowledge into the KB, while the third for inferring hidden knowledge from the available knowledge.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Semantic Integration</head><p>Semantic integration is the process of consuming structured data that can be translated to semantic information and consequently be populated to the KB. Typically, the information is provided in the form of JSON (JavaScript Object Notation) data and the relevant information is extracted from it. In order for the information to be inserted to the KB it is transformed to SPARQL queries that update the contents of the KB. E.g., if face recognition was to performed on video footage obtained from some event, then the resulting information could include the following:</p><p>-Event ID, i.e., the ID of the social event where the person was recognized, e.g., "1234". -Person ID, i.e., the ID of the recognized person, e.g., "person 5262".</p><p>-Timestamp, i.e., the moment when the person was detected, e.g., "2019-05-17T14:00:00Z". -The coordinates of the person, e.g., "latitude: 40.62" and "longitude: 22.94".</p><p>In this case the corresponding SPARQL query that could be used to populate the new information to the KB would be similar to the presented in Listing 1.1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Semantic Enrichment</head><p>Semantic enrichment is the process of enhancing the context of individual entities within the KB using a variety of sources. This process resembles semantic integration in that they both aim to populate the ontology. However, semantic enrichment typically refers to external sources, such as DBpedia (https:// wiki.dbpedia.org/) and other public Knowledge Bases (e.g., criminal records).</p><p>In particular, let us examine the case of reporting a past violent activity against a VIP. This particular enrichment example ties with the integration discussed above and enriches the already known information. Data from the criminal records would include:</p><p>-Person (determined by their ID) who committed the violent activity, e.g., "5262". -Target of the activity (ID), i.e., the entity that was intended to be harmed via the activity, e.g., "7382". -Timestamp, the moment when the person was detected, e.g., "2017-04-12T14:00:00Z". -The coordinates of the person, e.g., "latitude: 40.65" and "longitude: 23.01".</p><p>The SPARQL code that is presented in Listing 1.2 is produced given the previous information. The code is executed and the resulted changes are made to the KB. In this case, the entities that correspond to the event and the VIP participant were added in advance via integration methods, similar to the previous example. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Semantic Reasoning</head><p>Semantic reasoning is the automated process of inferring implicit information from the knowledge available in the KB. Semantic reasoning is performed as a set of SPARQL rules that evaluate the necessary conditions for the inference to</p><p>Copyright c 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). be valid. The inferences that result from the semantic reasoning are stored in the KB and can be forwarded to other tools if needed.</p><p>Semantic reasoning is performed automatically whenever the KB is updated via semantic integration and enrichment operations. In those cases, the semantic content changes and reasoning is applied to include the new information. Additionally, the semantic reasoning could be itself an enrichment process, by enriching the KB with new inferred information. In practice, semantic reasoning is triggered mainly by new analysis results becoming available. Moreover, a second method that triggers semantic reasoning is the use of specific reasoning requests from other tools or the end users. If this method is deployed as a second way to initiate reasoning, such reasoning request must be well defined. It is possible to allocate some reasoning methods to each of the two triggering mechanisms.</p><p>An example of semantic reasoning could examine whether a person that has performed violent actions against a VIP in the past attends the same social event as the VIP, then the person can be characterized as a potential threat. The SPARQL query (Listing 1.3) implements such a reasoning rule, and it is validated when the rule conditions are reached. Additionally, if the rule is realized, the appropriate updates are made to the KB.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>SELECT ? person ? vip WHERE {</head><p>? event : hasP articip ant ? person . ? event : h a s V I P P a r t i c i p a n t ? vip . ? person : performs ? activity . ? activity rdf : type : V i ol en tA c ti vi t y . ? activity : against ? vip . } Listing 1.3. SPARQL query for semantic reasoning</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions &amp; Future Work</head><p>This paper presented the Semantic Web technologies that are used in the context of the CONNEXIONs project towards an enriched reasoning framework for the support of LEAs in their fight against crime and terrorism. First, the ontology that acts as the basis for the semantic representation of multimodal heterogeneous and complex data, that are pertinent to the studied system, was presented. Next, the available semantic operations that aim to manipulate effectively the available data and provide useful insights about implicit knowledge that derives from the available data were illustrated. Overall, the presented framework is currently being successfully applied within the CONNEXIONs project and we aim to incorporate more complex semantic reasoning rules in the future.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The core classes of the ontology</figDesc><graphic coords="5,165.89,325.05,283.58,163.98" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Spatio-Temporal Context</figDesc><graphic coords="6,160.70,425.72,293.96,112.85" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgments This work has received funding from the European Union's H2020 research and innovation programme as part of the CONNEXIONs (GA No 786731) project.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0" />			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><surname>Benahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Assouli</surname></persName>
		</author>
		<title level="m">An ontology design for terrorism activities</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Brickley</surname></persName>
		</author>
		<title level="m">Basic geo (wgs84 lat/long) vocabulary</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
	<note>Documento informal escrito en colaboración</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Semantic knowledge representation in terrorist threat analysis for crisis management systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Chmielewski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ga Lka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Jarema</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Krasowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kosiński</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Computational Collective Intelligence</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="460" to="471" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">An analysis of ontologies and their success factors for application to business</title>
		<author>
			<persName><forename type="first">C</forename><surname>Feilmayr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wöß</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data &amp; Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">101</biblScope>
			<biblScope unit="page" from="1" to="23" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Theoretical investigation of terrorism. ontology development</title>
		<author>
			<persName><forename type="first">P</forename><surname>Galjano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Popovich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Fusion and Geographic Information Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="227" to="239" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Owl 2 web ontology language primer</title>
		<author>
			<persName><forename type="first">P</forename><surname>Hitzler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Krötzsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Parsia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">F</forename><surname>Patel-Schneider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rudolph</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">W3C recommendation</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">123</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Construction of fuzzy ontology-based terrorism event extraction</title>
		<author>
			<persName><forename type="first">U</forename><surname>Inyaem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Meesad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Haruechaiyasak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Tran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Third International Conference on Knowledge Discovery and Data Mining</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2010">2010. 2010</date>
			<biblScope unit="page" from="391" to="394" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Building a terrorism ontology</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mannes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Golbeck</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ISWC Workshop on Ontology Patterns for the Semantic Web</title>
				<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="volume">36</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Ontology building: A terrorism specialist&apos;s perspective</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mannes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Golbeck</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Aerospace Conference</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The prediction of terrorist threat on the basis of semantic association acquisition and complex network evolution</title>
		<author>
			<persName><forename type="first">A</forename><surname>Najgebauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Antkiewicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Chmielewski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kasprzak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Telecommunications and Information Technology</title>
		<imprint>
			<biblScope unit="page" from="14" to="20" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A unified model for socially interconnected multimedia-enriched objects</title>
		<author>
			<persName><forename type="first">T</forename><surname>Tsikrika</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Andreadou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Moumtzidou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Schinas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Papadopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vrochidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kompatsiaris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Multimedia Modeling</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="372" to="384" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">A simple ontology for the analysis of terrorist attacks</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Turner</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Building an ontology for cyberterrorism</title>
		<author>
			<persName><forename type="first">N</forename><surname>Veerasamy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Grobler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Von Solms</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Weimann</surname></persName>
		</author>
		<title level="m">Terror on the Internet: The new arena, the new challenges</title>
				<imprint>
			<publisher>US Institute of Peace Press</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
	<note>Copyright c 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0)</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
