000 | 05093nam a22004933i 4500 | ||
---|---|---|---|
001 | EBC647890 | ||
003 | MiAaPQ | ||
005 | 20181121155605.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 181113s2010 xx o ||||0 eng d | ||
020 |
_a9781607506119 _q(electronic bk.) |
||
020 | _z9781607506102 | ||
035 | _a(MiAaPQ)EBC647890 | ||
035 | _a(Au-PeEL)EBL647890 | ||
035 | _a(CaPaEBR)ebr10440465 | ||
035 | _a(CaONFJC)MIL295613 | ||
035 | _a(OCoLC)695981965 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
050 | 4 | _aHV6773 -- .N38 2009eb | |
082 | 0 | _a025.04 | |
100 | 1 | _aLast, M. | |
245 | 1 | 0 |
_aWeb Intelligence and Security : _bAdvances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web. |
264 | 1 |
_aAmsterdam : _bIOS Press, _c2010. |
|
264 | 4 | _c©2010. | |
300 | _a1 online resource (276 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aNATO Science for Peace and Security - D : Information and Communication Security ; _vv.v. 27 |
|
505 | 0 | _aTitle -- Preface -- Dedication Page -- Contents -- Part I - Terror and the Dark Web -- Fuzzy Logic, Uncertainty Management and The Black Swan -- World Financial Crisis and its Influence on Terror Financing -- Terrorist Facebook: Terrorists and Online Social Networking -- Al Qaeda and the Hybrid Jihad -- Cyber Criminal Mechanisms Employed in Social Engineering and Technical Tricks -- Part II - Web Content Mining and Open Source Intelligence -- Threat Early Warning through Web Mining -- Discover Shadow Groups from the Dark Web -- Toward Real Time Internet Traffic Monitoring* -- Investigation of Web Based Hidden Data -- Preventing Internet Banking Fraud and Money Laundering Using Customer Trustability Index -- Part III - Data and Text Mining for Security -- Knowledge Discovery from Data Streams1 -- Methods for Interactive Exploration of Large-Scale News Streams -- Development of Fuzzy System Models: Fuzzy Rulebases to Fuzzy Functions -- Some Fuzzy Logic Based Approaches to Flexible Database Querying and their Use for Discovering Security Related Information -- Privacy in Query Logs -- Making Sense of Unstructured Textual Data -- Language-independent Techniques for Automated Text Summarization -- Ontology Driven Multilingual Information Extraction and Intelligent Analytics -- Subject Index -- Author Index. | |
520 | _aTerrorists are continuously learning to utilize the Internet as an accessible and cost-effective information infrastructure. Since a constant manual monitoring of terrorist-generated multilingual web content is not a feasible task, automated Web Intelligence and Web Mining methods are indispensable for efficiently securing the Web against its misuse by terrorists and other dangerous criminals. Web Intelligence and Security contains chapters by the key speakers of the NATO Advanced Research Workshop on Web Intelligence and Security that took place on November 18-20, 2009 in Ein-Bokek, Israel. This Workshop has brought together a multinational group of leading scientists and practitioners interested in exploiting data and text mining techniques for countering terrorist activities on the Web. Most talks were focused on presenting available methods and tools that can alleviate the information overload of intelligence and security experts. The key features of this book include: An up-to-date analysis of the current and future threats of the Internet misuse by terrorists and other malicious elements including cyberterrorism, terror financing and interactive online communication by terrorists and their supporters; Detailed presentation of the state-of-the-art algorithms and tools aimed at detecting and monitoring malicious online activities on the Web; Introduction of novel data mining and text mining methods that can be used to efficiently analyze the massive amounts of multi-lingual Web content; The book's wide audience includes research scientists, graduate students, intelligence analysts, and data / text mining practitioners. | ||
588 | _aDescription based on publisher supplied metadata and other sources. | ||
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
650 | 0 | _aCyberterrorism -- Prevention. | |
650 | 0 | _aData mining. | |
655 | 4 | _aElectronic books. | |
700 | 1 | _aKandel, A. | |
700 | 1 | _aNATO Advanced Research Workshop on Web Intelligence and Security,. | |
700 | 1 | _aIOS Press,. | |
776 | 0 | 8 |
_iPrint version: _aLast, M. _tWeb Intelligence and Security : Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web _dAmsterdam : IOS Press,c2010 _z9781607506102 |
797 | 2 | _aProQuest (Firm) | |
830 | 0 | _aNATO Science for Peace and Security - D : Information and Communication Security | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=647890 _zClick to View |
999 |
_c80987 _d80987 |