Detecting Terror Activities on Web Using Data Mining Techniques
Abstract
Keywords
Full Text:
PDFReferences
Thuraisingham, B., ―Web Data Mining Technologies and Their Applications in Business Intelligence and Counter-terrorism‖, CRC Press, FL, 2003.
Lazarevic, A., et al., ―Data Mining for Computer Security Applications‖, Tutorial Proc. IEEE Data Mining Conference, 2005.
Thuraisingham B., ―Database and Applications Security‖, CRC Press, 2005..
Khan, L., Awad, M. and Thuraisingham, B. ―A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering‖, The VLDB Journal: ACM/Springer-Verlag, 16(1) 2007.
Thuraisingham, B., ―Managing Threats to Web Databases and Cyber Systems, Issues, Solutions and Challenges‖, Kluwer, MA 2004 (Editors: V. Kumar et al).
Global Terrorism Database, http://www.start.umd.edu/gtd/, Retreived on 05/02/2012..
Christine Dartigue, Hyun Ik Jang, and Wenjun Zeng, ‖ A New Data-Mining Based Approach for Network Intrusion Detection‖, IEEE 2009, Proc. of the seventh annual communication Networks and Services Research conference.
H. Chen, J. Qin, E. Reid, Y. Zhou, and M. Sageman, Terrorism Informatics – Knowledge Management and Data Mining for Homeland Security. Springer, 2008, ch. Case Study of Jihad on the Web.
McAndrew, D Structural Analysis of Criminal Networks. Social Psychology of Crime Groups, Teams, and Networks, Offender Profiling Series, III. L. Allison.
Kennedy, L. W., Lunn, C. M.: Developing a Foundation for Policy Relevant Terrorism Research in Criminology (2003)
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.