Fighting terror in cyberspace /:
As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks....
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hackensack, N.J. :
World Scientific,
©2005.
|
Schriftenreihe: | Series in machine perception and artificial intelligence ;
v. 65. |
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack. |
Beschreibung: | 1 online resource (xv, 167 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 981270325X 9789812703255 9789812564931 9812564934 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm77554503 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070108s2005 njua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d IDEBK |d OCLCQ |d MERUC |d OCLCQ |d OCLCF |d OCLCO |d NLGGC |d OCLCQ |d IOD |d CUY |d DKDLA |d ADU |d E7B |d CNMTR |d OCLCQ |d AZK |d JBG |d COCUF |d MOR |d PIFBR |d OCLCQ |d STF |d WRM |d VTS |d AGLDB |d INT |d OCLCQ |d AU@ |d M8D |d UKAHL |d OCLCQ |d UHL |d K6U |d UKCRE |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d INARC | ||
015 | |a GBA611138 |2 bnb | ||
016 | 7 | |a 013368112 |2 Uk | |
019 | |a 232160001 |a 474135686 |a 487743482 |a 614988695 |a 648233191 |a 722568296 |a 888790393 |a 961520480 |a 962619976 |a 988510020 |a 991922763 |a 1037787108 |a 1038629999 |a 1113284492 |a 1153534031 |a 1409469162 | ||
020 | |a 981270325X |q (electronic bk.) | ||
020 | |a 9789812703255 |q (electronic bk.) | ||
020 | |a 9789812564931 | ||
020 | |a 9812564934 | ||
035 | |a (OCoLC)77554503 |z (OCoLC)232160001 |z (OCoLC)474135686 |z (OCoLC)487743482 |z (OCoLC)614988695 |z (OCoLC)648233191 |z (OCoLC)722568296 |z (OCoLC)888790393 |z (OCoLC)961520480 |z (OCoLC)962619976 |z (OCoLC)988510020 |z (OCoLC)991922763 |z (OCoLC)1037787108 |z (OCoLC)1038629999 |z (OCoLC)1113284492 |z (OCoLC)1153534031 |z (OCoLC)1409469162 | ||
050 | 4 | |a QA76.9.D343 |b F55 2005eb | |
072 | 7 | |a POL |x 014000 |2 bisacsh | |
082 | 7 | |a 363.32 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Fighting terror in cyberspace / |c editors Mark Last and Abraham Kandel. |
260 | |a Hackensack, N.J. : |b World Scientific, |c ©2005. | ||
300 | |a 1 online resource (xv, 167 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a Series in machine perception and artificial intelligence ; |v v. 65 | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last. | |
588 | 0 | |a Print version record. | |
520 | |a As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack. | ||
650 | 0 | |a Data mining. |0 http://id.loc.gov/authorities/subjects/sh97002073 | |
650 | 0 | |a Internet. |0 http://id.loc.gov/authorities/subjects/sh92002816 | |
650 | 0 | |a Terrorism |x Prevention. |0 http://id.loc.gov/authorities/subjects/sh00007517 | |
650 | 2 | |a Data Mining |0 https://id.nlm.nih.gov/mesh/D057225 | |
650 | 2 | |a Internet |0 https://id.nlm.nih.gov/mesh/D020407 | |
650 | 6 | |a Exploration de données (Informatique) | |
650 | 6 | |a Internet. | |
650 | 6 | |a Terrorisme |x Prévention. | |
650 | 7 | |a Internet. |2 aat | |
650 | 7 | |a POLITICAL SCIENCE |x Political Freedom & Security |x Law Enforcement. |2 bisacsh | |
650 | 7 | |a Data mining |2 fast | |
650 | 7 | |a Internet |2 fast | |
650 | 7 | |a Terrorism |x Prevention |2 fast | |
700 | 1 | |a Last, Mark. | |
700 | 1 | |a Kandel, Abraham. | |
758 | |i has work: |a Fighting terror in cyberspace (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGW4pTJytY4HG6KTqWGF4y |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Fighting terror in cyberspace. |d Hackensack, N.J. : World Scientific, ©2005 |z 9812564934 |w (OCoLC)62859456 |
830 | 0 | |a Series in machine perception and artificial intelligence ; |v v. 65. |0 http://id.loc.gov/authorities/names/n91107585 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174599 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174599 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH24683970 | ||
938 | |a ebrary |b EBRY |n ebr10174027 | ||
938 | |a EBSCOhost |b EBSC |n 174599 | ||
938 | |a YBP Library Services |b YANK |n 2507581 | ||
938 | |a Internet Archive |b INAR |n isbn_9789812564931 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm77554503 |
---|---|
_version_ | 1829094606831091712 |
adam_text | |
any_adam_object | |
author2 | Last, Mark Kandel, Abraham |
author2_role | |
author2_variant | m l ml a k ak |
author_facet | Last, Mark Kandel, Abraham |
author_sort | Last, Mark |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D343 F55 2005eb |
callnumber-search | QA76.9.D343 F55 2005eb |
callnumber-sort | QA 276.9 D343 F55 42005EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last. |
ctrlnum | (OCoLC)77554503 |
dewey-full | 363.32 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.32 |
dewey-search | 363.32 |
dewey-sort | 3363.32 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04855cam a2200697 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm77554503 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">070108s2005 njua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOD</subfield><subfield code="d">CUY</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ADU</subfield><subfield code="d">E7B</subfield><subfield code="d">CNMTR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">JBG</subfield><subfield code="d">COCUF</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UHL</subfield><subfield code="d">K6U</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">INARC</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA611138</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">013368112</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">232160001</subfield><subfield code="a">474135686</subfield><subfield code="a">487743482</subfield><subfield code="a">614988695</subfield><subfield code="a">648233191</subfield><subfield code="a">722568296</subfield><subfield code="a">888790393</subfield><subfield code="a">961520480</subfield><subfield code="a">962619976</subfield><subfield code="a">988510020</subfield><subfield code="a">991922763</subfield><subfield code="a">1037787108</subfield><subfield code="a">1038629999</subfield><subfield code="a">1113284492</subfield><subfield code="a">1153534031</subfield><subfield code="a">1409469162</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">981270325X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812703255</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789812564931</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9812564934</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)77554503</subfield><subfield code="z">(OCoLC)232160001</subfield><subfield code="z">(OCoLC)474135686</subfield><subfield code="z">(OCoLC)487743482</subfield><subfield code="z">(OCoLC)614988695</subfield><subfield code="z">(OCoLC)648233191</subfield><subfield code="z">(OCoLC)722568296</subfield><subfield code="z">(OCoLC)888790393</subfield><subfield code="z">(OCoLC)961520480</subfield><subfield code="z">(OCoLC)962619976</subfield><subfield code="z">(OCoLC)988510020</subfield><subfield code="z">(OCoLC)991922763</subfield><subfield code="z">(OCoLC)1037787108</subfield><subfield code="z">(OCoLC)1038629999</subfield><subfield code="z">(OCoLC)1113284492</subfield><subfield code="z">(OCoLC)1153534031</subfield><subfield code="z">(OCoLC)1409469162</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.D343</subfield><subfield code="b">F55 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.32</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Fighting terror in cyberspace /</subfield><subfield code="c">editors Mark Last and Abraham Kandel.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Hackensack, N.J. :</subfield><subfield code="b">World Scientific,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 167 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Series in machine perception and artificial intelligence ;</subfield><subfield code="v">v. 65</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data mining.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh97002073</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh92002816</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00007517</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Data Mining</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D057225</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Internet</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D020407</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Exploration de données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="x">Prévention.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Freedom & Security</subfield><subfield code="x">Law Enforcement.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Last, Mark.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kandel, Abraham.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Fighting terror in cyberspace (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGW4pTJytY4HG6KTqWGF4y</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Fighting terror in cyberspace.</subfield><subfield code="d">Hackensack, N.J. : World Scientific, ©2005</subfield><subfield code="z">9812564934</subfield><subfield code="w">(OCoLC)62859456</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Series in machine perception and artificial intelligence ;</subfield><subfield code="v">v. 65.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n91107585</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174599</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=174599</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH24683970</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10174027</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">174599</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2507581</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">isbn_9789812564931</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm77554503 |
illustrated | Illustrated |
indexdate | 2025-04-11T08:35:48Z |
institution | BVB |
isbn | 981270325X 9789812703255 9789812564931 9812564934 |
language | English |
oclc_num | 77554503 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xv, 167 pages) : illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | World Scientific, |
record_format | marc |
series | Series in machine perception and artificial intelligence ; |
series2 | Series in machine perception and artificial intelligence ; |
spelling | Fighting terror in cyberspace / editors Mark Last and Abraham Kandel. Hackensack, N.J. : World Scientific, ©2005. 1 online resource (xv, 167 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Series in machine perception and artificial intelligence ; v. 65 Includes bibliographical references and index. Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last. Print version record. As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack. Data mining. http://id.loc.gov/authorities/subjects/sh97002073 Internet. http://id.loc.gov/authorities/subjects/sh92002816 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Data Mining https://id.nlm.nih.gov/mesh/D057225 Internet https://id.nlm.nih.gov/mesh/D020407 Exploration de données (Informatique) Internet. Terrorisme Prévention. Internet. aat POLITICAL SCIENCE Political Freedom & Security Law Enforcement. bisacsh Data mining fast Internet fast Terrorism Prevention fast Last, Mark. Kandel, Abraham. has work: Fighting terror in cyberspace (Text) https://id.oclc.org/worldcat/entity/E39PCGW4pTJytY4HG6KTqWGF4y https://id.oclc.org/worldcat/ontology/hasWork Print version: Fighting terror in cyberspace. Hackensack, N.J. : World Scientific, ©2005 9812564934 (OCoLC)62859456 Series in machine perception and artificial intelligence ; v. 65. http://id.loc.gov/authorities/names/n91107585 |
spellingShingle | Fighting terror in cyberspace / Series in machine perception and artificial intelligence ; Terrorism and the Internet : use and abuse / Abraham R. Wagner -- The radical Islam and the cyber jihad / Shaul Shay -- Using data mining technology for terrorist detection on the web / Mark Last -- A content-based model for web-monitoring / Bracha Shapira -- TDS : an innovative terrorist detection system / Yuval Elovici -- Clustering algorithms for variable-length vectors and their application to detecting terrorist activities / Menahem Friedman, Moti Schneider, Abraham Kandel -- Analysis of financial intelligence and the detection of terror financing / Yehuda Shaffer -- Identification of terrorist web sites with cross-lingual classification tools / Alex Markov and Mark Last. Data mining. http://id.loc.gov/authorities/subjects/sh97002073 Internet. http://id.loc.gov/authorities/subjects/sh92002816 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Data Mining https://id.nlm.nih.gov/mesh/D057225 Internet https://id.nlm.nih.gov/mesh/D020407 Exploration de données (Informatique) Internet. Terrorisme Prévention. Internet. aat POLITICAL SCIENCE Political Freedom & Security Law Enforcement. bisacsh Data mining fast Internet fast Terrorism Prevention fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh97002073 http://id.loc.gov/authorities/subjects/sh92002816 http://id.loc.gov/authorities/subjects/sh00007517 https://id.nlm.nih.gov/mesh/D057225 https://id.nlm.nih.gov/mesh/D020407 |
title | Fighting terror in cyberspace / |
title_auth | Fighting terror in cyberspace / |
title_exact_search | Fighting terror in cyberspace / |
title_full | Fighting terror in cyberspace / editors Mark Last and Abraham Kandel. |
title_fullStr | Fighting terror in cyberspace / editors Mark Last and Abraham Kandel. |
title_full_unstemmed | Fighting terror in cyberspace / editors Mark Last and Abraham Kandel. |
title_short | Fighting terror in cyberspace / |
title_sort | fighting terror in cyberspace |
topic | Data mining. http://id.loc.gov/authorities/subjects/sh97002073 Internet. http://id.loc.gov/authorities/subjects/sh92002816 Terrorism Prevention. http://id.loc.gov/authorities/subjects/sh00007517 Data Mining https://id.nlm.nih.gov/mesh/D057225 Internet https://id.nlm.nih.gov/mesh/D020407 Exploration de données (Informatique) Internet. Terrorisme Prévention. Internet. aat POLITICAL SCIENCE Political Freedom & Security Law Enforcement. bisacsh Data mining fast Internet fast Terrorism Prevention fast |
topic_facet | Data mining. Internet. Terrorism Prevention. Data Mining Internet Exploration de données (Informatique) Terrorisme Prévention. POLITICAL SCIENCE Political Freedom & Security Law Enforcement. Data mining Terrorism Prevention |
work_keys_str_mv | AT lastmark fightingterrorincyberspace AT kandelabraham fightingterrorincyberspace |