Computational Behaviour of radicalisation

Summary
An analysis report of radicalisation behaviour in the network in two types of radicalisation settings This report includes a detailed evaluation of the computational model in Task 51 by comparing the accuracy of the model to that obtained from experts and providing a user study for evaluating the efficacy of the visualisation