Browse and search a list of publications and products both published by NIJ and resulting from NIJ funding. This list includes reports submitted by grantees, NIJ reports and other publications, NIJ Journal issues and articles, products published by grantees, and articles appearing in peer review and other publications.
Enhancing Investigative Pattern Detection via Inexact Matching and Graph Databases
Dynamic, Graph-Based Risk Assessments for the Detection of Violent Extremist Radicalization Trajectories Using Large Scale Social and Behavioral Data
Radicalization Trajectories: An Evidence-Based Computational Approach to Dynamic Risk Assessment of "Homegrown" Jihadists
Recognizing Radicalization Indicators in Text Documents Using Human-in-the-Loop Information Extraction and NLP Techniques
Behavioral Study of the Radicalization Trajectories of American "Homegrown" Al Qaeda-Inspired Terrorist Offenders
Role of Social Networks in the Evolution of Al Qaeda-Inspired Violent Extremism in the United States, 1990-2015
Tweeting the Jihad Social media networks of Western foreign fighters in Syria and Iraq
Research Forensic Library
We invite you to also search the Research Forensic Library, a curated collection of publicly-accessible material relating to every discipline of the forensic sciences.