@inproceedings{scholars592,
         address = {Athens},
             doi = {10.1109/ComputationWorld.2009.105},
            note = {cited By 7; Conference of Computation World: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns, ComputationWorld 2009 ; Conference Date: 15 November 2009 Through 20 November 2009; Conference Code:79871},
            year = {2009},
           pages = {520--526},
           title = {Information extraction for counter-terrorism: A survey},
         journal = {Computation World: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns, ComputationWorld 2009},
        abstract = {The awareness of terrorism has increased since the event of the September 11 in the U.S. It has focused the spotlight on the absence of information available about terrorism. The fight against terrorism has trigger new effort to find better approaches to intelligence data gathering and analysis. Generally, a major activity in counter-terrorism is the ability to process high-volumes of data using various Artificial Intelligence (AI) techniques to identify potential threats. Recently, there has been a huge increase in the amount of intelligence-surveillance data literature. However, it so difficult to gain access to relevant data when the data are scattered in different departments and exist in many forms such as phone tap scripts, internet usage logs, emails, seized hard-drive, CCTV video, images, etc. In this paper, a survey is presented on the technical challenges in extracting terrorism data and sets forth several significant approaches to these technical challenges. The performance by each reviewed approaches in counter terrorism and other domains is evaluated. The potential of using Link Grammar (LG) in information processing is also explored. {\^A}{\copyright} 2009 IEEE.},
            isbn = {9780769538624},
             url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-77951006019&doi=10.1109\%2fComputationWorld.2009.105&partnerID=40&md5=96736d4930e60dd684e82bf971fce69f},
          author = {Zamin, N.},
        keywords = {Counter terrorism; Data gathering and analysis; Information Extraction; Information processing; Internet usage; Link grammar; Potential threats; September 11; Surveillance data; Technical challenges, Artificial intelligence; Data processing; Image processing; Information analysis; Surveys, Terrorism}
}