Web Intelligence and Security :Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web ( NATO Science for Peace and Security Series - D: Information and Communication Security )

Publication subTitle :Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web

Publication series : NATO Science for Peace and Security Series - D: Information and Communication Security

Author: Last M.;Kandel A.  

Publisher: Ios Press‎

Publication year: 2010

E-ISBN: 9781607506119

P-ISBN(Paperback): 9781607506102

Subject: D8 Diplomacy, International Relations

Keyword: 外交、国际关系

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Terrorists are continuously learning to utilize the Internet as an accessible and cost-effective information infrastructure. Since a constant manual monitoring of terrorist-generated multilingual web content is not a feasible task, automated Web Intelligence and Web Mining methods are indispensable for efficiently securing the Web against its misuse by terrorists and other dangerous criminals. Web Intelligence and Security contains chapters by the key speakers of the NATO Advanced Research Workshop on Web Intelligence and Security that took place on November 18-20, 2009 in Ein-Bokek, Israel. This Workshop has brought together a multinational group of leading scientists and practitioners interested in exploiting data and text mining techniques for countering terrorist activities on the Web. Most talks were focused on presenting available methods and tools that can alleviate the information overload of intelligence and security experts. The key features of this book include: An up-to-date analysis of the current and future threats of the Internet misuse by terrorists and other malicious elements including cyberterrorism, terror financing and interactive online communication by terrorists and their supporters; Detailed presentation of the state-of-the-art algorithms and tools aimed at detecting and monitoring malicious online activities on the Web; Introduction of novel data mining and text mining methods that can be used to efficiently analyze the massive amounts of multi-lin

Chapter

Cyber Criminal Mechanisms Employed in Social Engineering and Technical Tricks

Part II – Web Content Mining and Open Source Intelligence

Threat Early Warning through Web Mining

Discover Shadow Groups from the Dark Web

Toward Real Time Internet Traffic Monitoring*

Investigation of Web Based Hidden Data

Preventing Internet Banking Fraud and Money Laundering Using Customer Trustability Index

Part III – Data and Text Mining for Security

Knowledge Discovery from Data Streams1

Methods for Interactive Exploration of Large-Scale News Streams

Development of Fuzzy System Models: Fuzzy Rulebases to Fuzzy Functions

Some Fuzzy Logic Based Approaches to Flexible Database Querying and their Use for Discovering Security Related Information

Privacy in Query Logs

Making Sense of Unstructured Textual Data

Language-independent Techniques for Automated Text Summarization

Ontology Driven Multilingual Information Extraction and Intelligent Analytics

Subject Index

Author Index

The users who browse this book also browse