Web intelligence and security :: advances in data and text mining techniques for detecting and preventing terrorist activities on the web /
Terrorists are continuously learning to utilize the Internet as an accessible and cost-effective information infrastructure. Since a constant manual monitoring of terrorist-generated multilingual web content is not a feasible task, automated Web Intelligence and Web Mining methods are indispensable...
Gespeichert in:
Körperschaften: | , |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, DC :
IOS Press,
2010.
|
Schriftenreihe: | NATO science for peace and security series. Information and communication security.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Terrorists are continuously learning to utilize the Internet as an accessible and cost-effective information infrastructure. Since a constant manual monitoring of terrorist-generated multilingual web content is not a feasible task, automated Web Intelligence and Web Mining methods are indispensable for efficiently securing the Web against its misuse by terrorists and other dangerous criminals. Web Intelligence and Security contains chapters by the key speakers of the NATO Advanced Research Workshop on Web Intelligence and Security that took place on November 18-20, 2009 in Ein-Bokek, Israel. This Workshop has brought together a multinational group of leading scientists and practitioners interested in exploiting data and text mining techniques for countering terrorist activities on the Web. Most talks were focused on presenting available methods and tools that can alleviate the information overload of intelligence and security experts. The key features of this book include: An up-to-date analysis of the current and future threats of the Internet misuse by terrorists and other malicious elements including cyberterrorism, terror financing and interactive online communication by terrorists and their supporters; Detailed presentation of the state-of-the-art algorithms and tools aimed at detecting and monitoring malicious online activities on the Web; Introduction of novel data mining and text mining methods that can be used to efficiently analyze the massive amounts of multi-lingual Web content; The book's wide audience includes research scientists, graduate students, intelligence analysts, and data / text mining practitioners. |
Beschreibung: | 1 online resource (x, 265 pages) |
Bibliographie: | Includes bibliographical references and indexes. |
ISBN: | 9781607506119 1607506114 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn695981965 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 110110s2010 ne ob 101 0 eng d | ||
040 | |a IOSPR |b eng |e pn |c IOSPR |d YDXCP |d EBLCP |d OCLCQ |d N15 |d N$T |d OCLCQ |d MERUC |d OCLCQ |d OCLCF |d DKDLA |d OCLCQ |d OCLCO |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d OCL |d OCLCO |d OCLCQ |d AGLDB |d ZCU |d AL5MG |d JBG |d U3W |d OCLCQ |d VTS |d ICG |d VT2 |d AU@ |d OCLCQ |d WYU |d STF |d DKC |d OCLCQ |d M8D |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d OCLCO | ||
016 | 7 | |a 015689894 |2 Uk | |
019 | |a 702137145 |a 704572493 |a 1055403825 |a 1062913639 |a 1081229762 |a 1228599620 | ||
020 | |a 9781607506119 |q (electronic bk.) | ||
020 | |a 1607506114 |q (electronic bk.) | ||
020 | |z 1607506106 | ||
020 | |z 9781607506102 | ||
035 | |a (OCoLC)695981965 |z (OCoLC)702137145 |z (OCoLC)704572493 |z (OCoLC)1055403825 |z (OCoLC)1062913639 |z (OCoLC)1081229762 |z (OCoLC)1228599620 | ||
037 | |a 978-1-60750-611-9 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a QA76.9.D343 |b N38 2010 | |
072 | 7 | |a POL |x POL037000 |2 bisacsh | |
082 | 7 | |a 006.3/12 |2 22 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Research Workshop on Web Intelligence and Security |d (2009 : |c ʻEn Boḳeḳ, Israel) | |
245 | 1 | 0 | |a Web intelligence and security : |b advances in data and text mining techniques for detecting and preventing terrorist activities on the web / |c edited by Mark Last and Abraham Kandel. |
260 | |a Amsterdam ; |a Washington, DC : |b IOS Press, |c 2010. | ||
300 | |a 1 online resource (x, 265 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO science for peace and security series. D, Information and communication security | |
504 | |a Includes bibliographical references and indexes. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a pt. 1. Terror and the dark Web -- pt. 2. Web content mining and open source intelligence -- pt. 3. Data and text mining for security. | |
520 | |a Terrorists are continuously learning to utilize the Internet as an accessible and cost-effective information infrastructure. Since a constant manual monitoring of terrorist-generated multilingual web content is not a feasible task, automated Web Intelligence and Web Mining methods are indispensable for efficiently securing the Web against its misuse by terrorists and other dangerous criminals. Web Intelligence and Security contains chapters by the key speakers of the NATO Advanced Research Workshop on Web Intelligence and Security that took place on November 18-20, 2009 in Ein-Bokek, Israel. This Workshop has brought together a multinational group of leading scientists and practitioners interested in exploiting data and text mining techniques for countering terrorist activities on the Web. Most talks were focused on presenting available methods and tools that can alleviate the information overload of intelligence and security experts. The key features of this book include: An up-to-date analysis of the current and future threats of the Internet misuse by terrorists and other malicious elements including cyberterrorism, terror financing and interactive online communication by terrorists and their supporters; Detailed presentation of the state-of-the-art algorithms and tools aimed at detecting and monitoring malicious online activities on the Web; Introduction of novel data mining and text mining methods that can be used to efficiently analyze the massive amounts of multi-lingual Web content; The book's wide audience includes research scientists, graduate students, intelligence analysts, and data / text mining practitioners. | ||
650 | 0 | |a Data mining in law enforcement |v Congresses. | |
650 | 0 | |a Internet and terrorism |v Congresses. | |
650 | 0 | |a Terrorism |x Prevention |v Congresses. | |
650 | 0 | |a Internet |x Political aspects |v Congresses. | |
650 | 0 | |a Internet |x Security measures |v Congresses. | |
650 | 6 | |a Exploration de données (Informatique) dans l'application des lois |v Congrès. | |
650 | 6 | |a Internet et terrorisme |v Congrès. | |
650 | 6 | |a Terrorisme |x Prévention |v Congrès. | |
650 | 6 | |a Internet |x Aspect politique |v Congrès. | |
650 | 6 | |a Internet |x Sécurité |x Mesures |v Congrès. | |
650 | 7 | |a TRUE CRIME |x White Collar Crime. |2 bisacsh | |
650 | 7 | |a Data mining in law enforcement |2 fast | |
650 | 7 | |a Internet and terrorism |2 fast | |
650 | 7 | |a Internet |x Political aspects |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
650 | 7 | |a Terrorism |x Prevention |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Last, Mark. |1 https://id.oclc.org/worldcat/entity/E39PCjrxqwdmDH8QMyQD4XfFGb |0 http://id.loc.gov/authorities/names/nb2001002378 | |
700 | 1 | |a Kandel, Abraham. |1 https://id.oclc.org/worldcat/entity/E39PCjxCpFYvtQmyw9BT3fjBKb |0 http://id.loc.gov/authorities/names/n79067239 | |
710 | 2 | |a IOS Press. |1 https://id.oclc.org/worldcat/entity/E39QH7Jmq4CDTK3QFTckWWjytg |0 http://id.loc.gov/authorities/names/no2015091156 | |
776 | 0 | 8 | |i Print version: |t Web intelligence and security. |d Amsterdam : Ios Press, 2010 |z 1607506106 |w (OCoLC)669738925 |
830 | 0 | |a NATO science for peace and security series. |n Sub-series D, |p Information and communication security. |0 http://id.loc.gov/authorities/names/no2007140990 | |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=351775 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=351775 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL647890 | ||
938 | |a EBSCOhost |b EBSC |n 351775 | ||
938 | |a YBP Library Services |b YANK |n 3596455 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn695981965 |
---|---|
_version_ | 1829094687121604608 |
adam_text | |
any_adam_object | |
author2 | Last, Mark Kandel, Abraham |
author2_role | |
author2_variant | m l ml a k ak |
author_GND | http://id.loc.gov/authorities/names/nb2001002378 http://id.loc.gov/authorities/names/n79067239 |
author_corporate | NATO Advanced Research Workshop on Web Intelligence and Security ʻEn Boḳeḳ, Israel IOS Press |
author_corporate_role | |
author_facet | Last, Mark Kandel, Abraham NATO Advanced Research Workshop on Web Intelligence and Security ʻEn Boḳeḳ, Israel IOS Press |
author_sort | NATO Advanced Research Workshop on Web Intelligence and Security ʻEn Boḳeḳ, Israel |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D343 N38 2010 |
callnumber-search | QA76.9.D343 N38 2010 |
callnumber-sort | QA 276.9 D343 N38 42010 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | pt. 1. Terror and the dark Web -- pt. 2. Web content mining and open source intelligence -- pt. 3. Data and text mining for security. |
ctrlnum | (OCoLC)695981965 |
dewey-full | 006.3/12 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3/12 |
dewey-search | 006.3/12 |
dewey-sort | 16.3 212 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05633cam a2200721 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn695981965</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">110110s2010 ne ob 101 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N15</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ZCU</subfield><subfield code="d">AL5MG</subfield><subfield code="d">JBG</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">VT2</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">015689894</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">702137145</subfield><subfield code="a">704572493</subfield><subfield code="a">1055403825</subfield><subfield code="a">1062913639</subfield><subfield code="a">1081229762</subfield><subfield code="a">1228599620</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607506119</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607506114</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1607506106</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781607506102</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)695981965</subfield><subfield code="z">(OCoLC)702137145</subfield><subfield code="z">(OCoLC)704572493</subfield><subfield code="z">(OCoLC)1055403825</subfield><subfield code="z">(OCoLC)1062913639</subfield><subfield code="z">(OCoLC)1081229762</subfield><subfield code="z">(OCoLC)1228599620</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-60750-611-9</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.D343</subfield><subfield code="b">N38 2010</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">POL037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.3/12</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Research Workshop on Web Intelligence and Security</subfield><subfield code="d">(2009 :</subfield><subfield code="c">ʻEn Boḳeḳ, Israel)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web intelligence and security :</subfield><subfield code="b">advances in data and text mining techniques for detecting and preventing terrorist activities on the web /</subfield><subfield code="c">edited by Mark Last and Abraham Kandel.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington, DC :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2010.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 265 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO science for peace and security series. D, Information and communication security</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. Terror and the dark Web -- pt. 2. Web content mining and open source intelligence -- pt. 3. Data and text mining for security.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Terrorists are continuously learning to utilize the Internet as an accessible and cost-effective information infrastructure. Since a constant manual monitoring of terrorist-generated multilingual web content is not a feasible task, automated Web Intelligence and Web Mining methods are indispensable for efficiently securing the Web against its misuse by terrorists and other dangerous criminals. Web Intelligence and Security contains chapters by the key speakers of the NATO Advanced Research Workshop on Web Intelligence and Security that took place on November 18-20, 2009 in Ein-Bokek, Israel. This Workshop has brought together a multinational group of leading scientists and practitioners interested in exploiting data and text mining techniques for countering terrorist activities on the Web. Most talks were focused on presenting available methods and tools that can alleviate the information overload of intelligence and security experts. The key features of this book include: An up-to-date analysis of the current and future threats of the Internet misuse by terrorists and other malicious elements including cyberterrorism, terror financing and interactive online communication by terrorists and their supporters; Detailed presentation of the state-of-the-art algorithms and tools aimed at detecting and monitoring malicious online activities on the Web; Introduction of novel data mining and text mining methods that can be used to efficiently analyze the massive amounts of multi-lingual Web content; The book's wide audience includes research scientists, graduate students, intelligence analysts, and data / text mining practitioners.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data mining in law enforcement</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet and terrorism</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Political aspects</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Exploration de données (Informatique) dans l'application des lois</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet et terrorisme</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Terrorisme</subfield><subfield code="x">Prévention</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Aspect politique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME</subfield><subfield code="x">White Collar Crime.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data mining in law enforcement</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet and terrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Political aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Last, Mark.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjrxqwdmDH8QMyQD4XfFGb</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2001002378</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kandel, Abraham.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjxCpFYvtQmyw9BT3fjBKb</subfield><subfield code="0">http://id.loc.gov/authorities/names/n79067239</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39QH7Jmq4CDTK3QFTckWWjytg</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Web intelligence and security.</subfield><subfield code="d">Amsterdam : Ios Press, 2010</subfield><subfield code="z">1607506106</subfield><subfield code="w">(OCoLC)669738925</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">Sub-series D,</subfield><subfield code="p">Information and communication security.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007140990</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=351775</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=351775</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL647890</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">351775</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3596455</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn695981965 |
illustrated | Not Illustrated |
indexdate | 2025-04-11T08:37:05Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781607506119 1607506114 |
language | English |
oclc_num | 695981965 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (x, 265 pages) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Information and communication security. |
series2 | NATO science for peace and security series. D, Information and communication security |
spelling | NATO Advanced Research Workshop on Web Intelligence and Security (2009 : ʻEn Boḳeḳ, Israel) Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web / edited by Mark Last and Abraham Kandel. Amsterdam ; Washington, DC : IOS Press, 2010. 1 online resource (x, 265 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO science for peace and security series. D, Information and communication security Includes bibliographical references and indexes. Print version record. pt. 1. Terror and the dark Web -- pt. 2. Web content mining and open source intelligence -- pt. 3. Data and text mining for security. Terrorists are continuously learning to utilize the Internet as an accessible and cost-effective information infrastructure. Since a constant manual monitoring of terrorist-generated multilingual web content is not a feasible task, automated Web Intelligence and Web Mining methods are indispensable for efficiently securing the Web against its misuse by terrorists and other dangerous criminals. Web Intelligence and Security contains chapters by the key speakers of the NATO Advanced Research Workshop on Web Intelligence and Security that took place on November 18-20, 2009 in Ein-Bokek, Israel. This Workshop has brought together a multinational group of leading scientists and practitioners interested in exploiting data and text mining techniques for countering terrorist activities on the Web. Most talks were focused on presenting available methods and tools that can alleviate the information overload of intelligence and security experts. The key features of this book include: An up-to-date analysis of the current and future threats of the Internet misuse by terrorists and other malicious elements including cyberterrorism, terror financing and interactive online communication by terrorists and their supporters; Detailed presentation of the state-of-the-art algorithms and tools aimed at detecting and monitoring malicious online activities on the Web; Introduction of novel data mining and text mining methods that can be used to efficiently analyze the massive amounts of multi-lingual Web content; The book's wide audience includes research scientists, graduate students, intelligence analysts, and data / text mining practitioners. Data mining in law enforcement Congresses. Internet and terrorism Congresses. Terrorism Prevention Congresses. Internet Political aspects Congresses. Internet Security measures Congresses. Exploration de données (Informatique) dans l'application des lois Congrès. Internet et terrorisme Congrès. Terrorisme Prévention Congrès. Internet Aspect politique Congrès. Internet Sécurité Mesures Congrès. TRUE CRIME White Collar Crime. bisacsh Data mining in law enforcement fast Internet and terrorism fast Internet Political aspects fast Internet Security measures fast Terrorism Prevention fast Conference papers and proceedings fast Last, Mark. https://id.oclc.org/worldcat/entity/E39PCjrxqwdmDH8QMyQD4XfFGb http://id.loc.gov/authorities/names/nb2001002378 Kandel, Abraham. https://id.oclc.org/worldcat/entity/E39PCjxCpFYvtQmyw9BT3fjBKb http://id.loc.gov/authorities/names/n79067239 IOS Press. https://id.oclc.org/worldcat/entity/E39QH7Jmq4CDTK3QFTckWWjytg http://id.loc.gov/authorities/names/no2015091156 Print version: Web intelligence and security. Amsterdam : Ios Press, 2010 1607506106 (OCoLC)669738925 NATO science for peace and security series. Sub-series D, Information and communication security. http://id.loc.gov/authorities/names/no2007140990 |
spellingShingle | Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web / NATO science for peace and security series. Information and communication security. pt. 1. Terror and the dark Web -- pt. 2. Web content mining and open source intelligence -- pt. 3. Data and text mining for security. Data mining in law enforcement Congresses. Internet and terrorism Congresses. Terrorism Prevention Congresses. Internet Political aspects Congresses. Internet Security measures Congresses. Exploration de données (Informatique) dans l'application des lois Congrès. Internet et terrorisme Congrès. Terrorisme Prévention Congrès. Internet Aspect politique Congrès. Internet Sécurité Mesures Congrès. TRUE CRIME White Collar Crime. bisacsh Data mining in law enforcement fast Internet and terrorism fast Internet Political aspects fast Internet Security measures fast Terrorism Prevention fast |
title | Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web / |
title_auth | Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web / |
title_exact_search | Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web / |
title_full | Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web / edited by Mark Last and Abraham Kandel. |
title_fullStr | Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web / edited by Mark Last and Abraham Kandel. |
title_full_unstemmed | Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web / edited by Mark Last and Abraham Kandel. |
title_short | Web intelligence and security : |
title_sort | web intelligence and security advances in data and text mining techniques for detecting and preventing terrorist activities on the web |
title_sub | advances in data and text mining techniques for detecting and preventing terrorist activities on the web / |
topic | Data mining in law enforcement Congresses. Internet and terrorism Congresses. Terrorism Prevention Congresses. Internet Political aspects Congresses. Internet Security measures Congresses. Exploration de données (Informatique) dans l'application des lois Congrès. Internet et terrorisme Congrès. Terrorisme Prévention Congrès. Internet Aspect politique Congrès. Internet Sécurité Mesures Congrès. TRUE CRIME White Collar Crime. bisacsh Data mining in law enforcement fast Internet and terrorism fast Internet Political aspects fast Internet Security measures fast Terrorism Prevention fast |
topic_facet | Data mining in law enforcement Congresses. Internet and terrorism Congresses. Terrorism Prevention Congresses. Internet Political aspects Congresses. Internet Security measures Congresses. Exploration de données (Informatique) dans l'application des lois Congrès. Internet et terrorisme Congrès. Terrorisme Prévention Congrès. Internet Aspect politique Congrès. Internet Sécurité Mesures Congrès. TRUE CRIME White Collar Crime. Data mining in law enforcement Internet and terrorism Internet Political aspects Internet Security measures Terrorism Prevention Conference papers and proceedings |
work_keys_str_mv | AT natoadvancedresearchworkshoponwebintelligenceandsecurityʻenbokekisrael webintelligenceandsecurityadvancesindataandtextminingtechniquesfordetectingandpreventingterroristactivitiesontheweb AT lastmark webintelligenceandsecurityadvancesindataandtextminingtechniquesfordetectingandpreventingterroristactivitiesontheweb AT kandelabraham webintelligenceandsecurityadvancesindataandtextminingtechniquesfordetectingandpreventingterroristactivitiesontheweb AT iospress webintelligenceandsecurityadvancesindataandtextminingtechniquesfordetectingandpreventingterroristactivitiesontheweb |