Muutke küpsiste eelistusi

Web Intelligence and Security: Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web [Kõva köide]

Edited by , Edited by
Teised raamatud teemal:
Teised raamatud teemal:
Terrorists are continuously learning to utilize the Internet as an accessible and cost-effective information infrastructure. Since a constant manual monitoring of terrorist-generated multilingual web content is not a feasible task, automated Web Intelligence and Web Mining methods are indispensable for efficiently securing the Web against its misuse by terrorists and other dangerous criminals. "Web Intelligence and Security" contains chapters by the key speakers of the NATO Advanced Research Workshop on Web Intelligence and Security that took place on November 18-20, 2009 in Ein-Bokek, Israel. This Workshop has brought together a multinational group of leading scientists and practitioners interested in exploiting data and text mining techniques for countering terrorist activities on the Web. Most talks were focused on presenting available methods and tools that can alleviate the information overload of intelligence and security experts. The key features of this book include: an up-to-date analysis of the current and future threats of the Internet misuse by terrorists and other malicious elements including cyberterrorism, terror financing and interactive online communication by terrorists and their supporters; detailed presentation of the state-of-the-art algorithms and tools aimed at detecting and monitoring malicious online activities on the Web; and, an introduction of novel data mining and text mining methods that can be used to efficiently analyze the massive amounts of multi-lingual Web content. The book's wide audience includes research scientists, graduate students, intelligence analysts, and data/text mining practitioners.
Preface v
Dedication Page vii
Part I Terror and the Dark Web
Fuzzy Logic, Uncertainty Management, and the Black Swan
3(10)
Abraham Kandel
World Financial Crisis and its Influence on Terror Financing
13(6)
Josef Bollag
Terrorist Facebook: Terrorists and Online Social Networking
19(12)
Gabriel Weimann
Al Qaeda and the Hybrid Jihad
31(6)
Shaul Shay
Cyber Criminal Mechanisms Employed in Social Engineering and Technical Tricks
37(18)
Artak Barseghyan
Part II Web Content Mining and Open Source Intelligence
Threat Early Warning through Web Mining
55(12)
Clive Best
Discover Shadow Groups from the Dark Web
67(16)
Daniel Hladky
Christian Ehrlich
Irina Efimenko
Vyacheslav Vorobyov
Toward Real Time Internet Traffic Monitoring
83(10)
Benny Porat
Ely Porat
Investigation of Web Based Hidden Data
93(16)
Gevorg Margarov
Preventing Internet Banking Fraud and Money Laundering Using Customer Trustability Index
109(16)
M. Hamdi Ozcelik
Ekrem Duman
Part III Data and Text Mining for Security
Knowledge Discovery from Data Streams
125(14)
Joao Gama
Pedro Pereira Rodrigues
Eduardo Spinosa
Andre Carvalho
Methods for Interactive Exploration of Large-Scale News Streams
139(16)
Daniel A. Keim
Milos Krstajic
Peter Bak
Daniela Oelke
Florian Mansmann
Development of Fuzzy System Models: Fuzzy Rulebases to Fuzzy Functions
155(14)
I. Burhan Turksen
Some Fuzzy Logic Based Approaches to Flexible Database Querying and their Use for Discovering Security Related Information
169(20)
Janusz Kacprzyk
Stawomir Zadrozny
Privacy in Query Logs
189(6)
Ricardo Baeza-Yates
Making Sense of Unstructured Textual Data
195(12)
Dan Roth
Language-independent Techniques for Automated Text Summarization
207(32)
Mark Last
Marina Litvak
Ontology Driven Multilingual Information Extraction and Intelligent Analytics
239(24)
Vladimir F. Khoroshevsky
Subject Index 263(2)
Author Index 265