Richard Frank
Cited by
Cited by
Age and the distance to crime
MA Andresen, R Frank, M Felson
Criminology & Criminal Justice 14 (3), 314-333, 2014
Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors
R Scrivens, G Davies, R Frank
Behavioral sciences of terrorism and political aggression 10 (1), 39-59, 2018
Upvoting extremism: Collective identity formation and the extreme right on Reddit
T Gaudette, R Scrivens, G Davies, R Frank
New Media & Society 23 (12), 3491-3508, 2021
Identifying digital threats in a hacker web forum
M Macdonald, R Frank, J Mei, B Monk
Proceedings of the 2015 IEEE/ACM international conference on advances in …, 2015
Finding the key players in online child exploitation networks
BG Westlake, M Bouchard, R Frank
Policy & Internet 3 (2), 1-32, 2011
Measuring the evolution of radical right-wing posting behaviors online
R Scrivens, G Davies, R Frank
Deviant Behavior 41 (2), 216-232, 2020
Power of criminal attractors: Modeling the pull of activity nodes
R Frank, V Dabbaghian, A Reid, S Singh, J Cinnamon, P Brantingham
Journal of Artificial Societies and Social Simulation 14 (1), 6, 2011
The supremacy of online white supremacists–an analysis of online discussions by white supremacists
MA Wong, R Frank, R Allsup
Information & Communications Technology Law 24 (1), 41-73, 2015
Surfacing collaborated networks in dark web to find illicit and criminal content
AT Zulkarnine, R Frank, B Monk, J Mitchell, G Davies
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 109-114, 2016
Voices Against Extremism: A case study of a community-based CVE counter-narrative campaign
L Macnair, R Frank
Journal for Deradicalization, 147-174, 2017
Preliminary analytical considerations in designing a terrorism and extremism online network extractor
M Bouchard, K Joffres, R Frank
Computational models of complex systems, 171-184, 2014
Co-offending network mining
PL Brantingham, M Ester, R Frank, U Glässer, MA Tayebi
Counterterrorism and Open Source Intelligence, 73-102, 2011
The structure and content of online child exploitation networks
R Frank, B Westlake, M Bouchard
ACM SIGKDD Workshop on Intelligence and Security Informatics, 1-9, 2010
Criminal directionality and the structure of urban form
R Frank, MA Andresen, PL Brantingham
Journal of Environmental Psychology 32 (1), 37-42, 2012
A method for multi-relational classification using single and multi-feature aggregation functions
R Frank, F Moser, M Ester
European Conference on Principles of Data Mining and Knowledge Discovery …, 2007
“To My Brothers in the West...”: A Thematic Analysis of Videos Produced by the Islamic State’s al-Hayat Media Center
L Macnair, R Frank
Journal of contemporary criminal justice 33 (3), 234-253, 2017
Uncovering the spatial patterning of crimes: A criminal movement model (CriMM)
AA Reid, R Frank, N Iwanski, V Dabbaghian, P Brantingham
Journal of research in crime and delinquency 51 (2), 230-255, 2014
Analyzing an offender's journey to crime: A criminal movement model (CriMM)
N Iwanski, R Frank, V Dabbaghian, A Reid, P Brantingham
2011 European intelligence and security informatics conference, 70-77, 2011
How election dynamics shape perceptions of electoral integrity
RW Frank, FM i Coma
Electoral Studies 48, 153-165, 2017
Comparing methods for detecting child exploitation content online
B Westlake, M Bouchard, R Frank
2012 European Intelligence and Security Informatics Conference, 156-163, 2012
The system can't perform the operation now. Try again later.
Articles 1–20