Figure 4From: Harvesting and analysis of weak signals for detecting lone wolf terrorists List of monitored aliases within the Impactorium tool. Back to article page