Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where George Kalpakis is active.

Publication


Featured researches published by George Kalpakis.


international conference on human-computer interaction | 2016

Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes

George Kalpakis; Theodora Tsikrika; Christos Iliou; Thodoris Mironidis; Stefanos Vrochidis; Jonathan Middleton; Una Williamson; Ioannis Kompatsiaris

This work investigates the effectiveness of a novel interactive search engine in the context of discovering and retrieving Web resources containing recipes for synthesizing Home Made Explosives (HMEs). The discovery of HME Web resources both on Surface and Dark Web is addressed as a domain-specific search problem; the architecture of the search engine is based on a hybrid infrastructure that combines two different approaches: (i) a Web crawler focused on the HME domain; (ii) the submission of HME domain-specific queries to general-purpose search engines. Both approaches are accompanied by a user-initiated post-processing classification for reducing the potential noise in the discovery results. The design of the application is built based on the distinctive nature of law enforcement agency user requirements, which dictate the interactive discovery and the accurate filtering of Web resources containing HME recipes. The experiments evaluating the effectiveness of our application demonstrate its satisfactory performance, which in turn indicates the significant potential of the adopted approaches on the HME domain.


european intelligence and security informatics conference | 2016

Key Player Identification in Terrorism-Related Social Media Networks Using Centrality Measures

Ilias Gialampoukidis; George Kalpakis; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris

Monitoring terrorist groups and their suspicious activities in social media is a challenging task, given the large amounts of data involved and the need to identify the most influential users in a smart way. To this end, many efforts have focused on using centrality measures for the identification of the key players in terrorism-related social media networks, so that their suspension/removal leads to severe disruption in the connectivity of the network. This work proposes a novel centrality measure, Mapping Entropy Betweenness (MEB), and assesses its effectiveness for key player identification on a dataset of terrorism-related Twitter user accounts by simulating targeted attacks that remove the most central nodes of the network. The results indicate that the MEB affects the robustness of this terrorist network more than well-established centrality measures.


availability, reliability and security | 2015

A Framework for the Discovery, Analysis, and Retrieval of Multimedia Homemade Explosives Information on the Web

Theodora Tsikrika; George Kalpakis; Stefanos Vrochidis; Ioannis Kompatsiaris; Iraklis Paraskakis; Isaak Kavasidis; Jonathan Middleton; Una Williamson

This work proposes a novel framework that integrates diverse state-of-the-art technologies for the discovery, analysis, retrieval, and recommendation of heterogeneous Web resources containing multimedia information about homemade explosives (HMEs), with particular focus on HME recipe information. The framework corresponds to a knowledge management platform that enables the interaction with HME information, and consists of three major components: (i) a discovery component that allows for the identification of HME resources on the Web, (ii) a content-based multimedia analysis component that detects HME-related concepts in multimedia content, and (iii) an indexing, retrieval, and recommendation component that processes the available HME information to enable its (semantic) search and provision of similar information. The proposed framework is being developed in a user-driven manner, based on the requirements of law enforcement and security agencies personnel, as well as HME domain experts. In addition, its development is guided by the characteristics of HME Web resources, as these have been observed in an empirical study conducted by HME domain experts. Overall, this framework is envisaged to increase the operational effectiveness and efficiency of law enforcement and security agencies in their quest to keep the citizen safe.


availability, reliability and security | 2015

Concept Detection in Multimedia Web Resources About Home Made Explosives

George Kalpakis; Theodora Tsikrika; Foteini Markatopoulou; Nikiforos Pittaras; Stefanos Vrochidis; Vasileios Mezaris; Ioannis Patras; Ioannis Kompatsiaris

This work investigates the effectiveness of a state-of-the-art concept detection framework for the automatic classification of multimedia content, namely images and videos, embedded in publicly available Web resources containing recipes for the synthesis of Home Made Explosives (HMEs), to a set of predefined semantic concepts relevant to the HME domain. The concept detection framework employs advanced methods for video (shot) segmentation, visual feature extraction (using SIFT, SURF, and their variations), and classification based on machine learning techniques (logistic regression). The evaluation experiments are performed using an annotated collection of multimedia HME content discovered on the Web, and a set of concepts, which emerged both from an empirical study, and were also provided by domain experts and interested stakeholders, including Law Enforcement Agencies personnel. The experiments demonstrate the satisfactory performance of our framework, which in turn indicates the significant potential of the adopted approaches on the HME domain.


availability, reliability and security | 2016

Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web

Christos Iliou; George Kalpakis; Theodora Tsikrika; Stefanos Vrochidis; Ioannis Kompatsiaris

This work proposes a generic focused crawling framework for discovering resources on any given topic that reside on the Surface or the Dark Web. The proposed crawler is able to seamlessly traverse the Surface Web and several darknets present in the Dark Web (i.e. Tor, I2P and Freenet) during a single crawl by automatically adapting its crawling behavior and its classifier-guided hyperlink selection strategy based on the network type. This hybrid focused crawler is demonstrated for the discovery of Web resources containing recipes for producing homemade explosives. The evaluation experiments indicate the effectiveness of the proposed ap-proach both for the Surface and the Dark Web.


Proceedings of the 2nd International Workshop on Multimedia Forensics and Security | 2017

Detection of Terrorism-related Twitter Communities using Centrality Scores

Ilias Gialampoukidis; George Kalpakis; Theodora Tsikrika; Symeon Papadopoulos; Stefanos Vrochidis; Ioannis Kompatsiaris

Social media are widely used among terrorists to communicate and disseminate their activities. User-to-user interaction (e.g. mentions, follows) leads to the formation of complex networks, with topology that reveals key-players and key-communities in the terrorism domain. Both the administrators of social media platforms and Law Enforcement Agencies seek to identify not only single users but groups of terrorism-related users so that they can reduce the impact of their information exchange efforts. To this end, we propose a novel framework that combines community detection with key-player identification to retrieve communities of terrorism-related social media users. Experiments show that most of the members of each retrieved key-community are already suspended by Twitter, violating its terms, and are hence associated with terrorism-oriented content with high probability.


Archive | 2018

Analysis of Suspended Terrorism-Related Content on Social Media

George Kalpakis; Theodora Tsikrika; Ilias Gialampoukidis; Symeon Papadopoulos; Stefanos Vrochidis; Ioannis Kompatsiaris

Social media are widely used by terrorist organizations and extremist groups for disseminating propaganda and recruiting new members. Given the recent pledges both by the major social media platforms and governments towards combating online terrorism, our work aims at understanding the terrorism-related content posted on social media and distinguishing accounts of relevance to terrorism investigations from innocuous ones. We conducted an analysis of textual, spatial, temporal and social network features on data and metadata gathered from suspended Twitter content, and compared them with non-suspended content. Our analysis reveals a number of distinct characteristics of terrorism-related Twitter accounts. This work is a first step towards automated tools for the early detection of terrorism-related and extremist content on Twitter.


Archive | 2018

Adaptive Focused Crawling Using Online Learning: A Study on Content Related to Islamic Extremism

Christos Iliou; Theodora Tsikrika; George Kalpakis; Stefanos Vrochidis; Ioannis Kompatsiaris

Focused crawlers aim to automatically discover online content resources relevant to a domain of interest by automatically navigating through the Web link structure and selecting which hyperlinks to follow based on an estimation of their relevance to the topic of interest; to this end, classifier-guided approaches are typically employed for identifying hyperlinks having the higher likelihood of leading to relevant content. However, the training data used for building these classifiers might not be entirely representative of the domain of interest, or the domain of interest might change over time. To meet these challenges, this work proposes a novel adaptive focused crawling framework that allows the classifiers that underlie the hyperlink selection policy to be adapted based on the evidence they encounter during their crawls. Our framework uses two different approaches to retrain its models: (i) Interactive Adaptation, where a user manually evaluates the discovered resources, and (ii) Automatic Adaptation, where the framework uses the already trained classifiers to assess the relevance of newly discovered resources. The evaluation experiments in the domain of Islamic extremism indicate the effectiveness of online learning in focused crawling.


Archive | 2016

OSINT and the Dark Web

George Kalpakis; Theodora Tsikrika; Neil Cunningham; Christos Iliou; Stefanos Vrochidis; Jonathan Middleton; Ioannis Kompatsiaris

The Dark Web, a part of the Deep Web that consists of several darknets (e.g. Tor, I2P, and Freenet), provides users with the opportunity of hiding their identity when surfing or publishing information. This anonymity facilitates the communication of sensitive data for legitimate purposes, but also provides the ideal environment for transferring information, goods, and services with potentially illegal intentions. Therefore, Law Enforcement Agencies (LEAs) are very much interested in gathering OSINT on the Dark Web that would allow them to successfully prosecute individuals involved in criminal and terrorist activities. To this end, LEAs need appropriate technologies that would allow them to discover darknet sites that facilitate such activities and identify the users involved. This chapter presents current efforts in this direction by first providing an overview of the most prevalent darknets, their underlying technologies, their size, and the type of information they contain. This is followed by a discussion of the LEAs’ perspective on OSINT on the Dark Web and the challenges they face towards discovering and de-anonymizing such information and by a review of the currently available techniques to this end. Finally, a case study on discovering terrorist-related information, such as home made explosive recipes, on the Dark Web is presented.


european intelligence and security informatics conference | 2017

A Monitoring Tool for Terrorism-Related Key-Players and Key-Communities in Social Media Networks

Stelios Andreadis; Ilias Gialampoukidis; George Kalpakis; Theodora Tsikrika; Symeon Papadopoulos; Stefanos Vrochidis; Ioannis Kompatsiaris

Collaboration


Dive into the George Kalpakis's collaboration.

Top Co-Authors

Avatar

Stefanos Vrochidis

Information Technology Institute

View shared research outputs
Top Co-Authors

Avatar

Theodora Tsikrika

Queen Mary University of London

View shared research outputs
Top Co-Authors

Avatar

Ilias Gialampoukidis

Aristotle University of Thessaloniki

View shared research outputs
Top Co-Authors

Avatar

Symeon Papadopoulos

Aristotle University of Thessaloniki

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stelios Andreadis

Aristotle University of Thessaloniki

View shared research outputs
Top Co-Authors

Avatar

Symeon Papadopoulos

Aristotle University of Thessaloniki

View shared research outputs
Researchain Logo
Decentralizing Knowledge