Using Data Mining Technology for Terrorist Detection on the Web

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

The following sections are included: • Introduction: Who is Hiding in Cyber Caves? • Data Mining for Countering Terror in Cyberspace • Taxonomy of Data Mining Methods • Data Mining Needs and Challenges for Cyber Security and Cyber Intelligence • Key Techniques of Cyber Warfare • Link Analysis • Information Agents • Trend Discovery • Real- Time Data Mining • Input-Output Analysis of Software Systems • Summary • Bibliography.

Original languageEnglish
Title of host publicationFighting Terror In Cyberspace
EditorsMark Last, Abraham Kandel
PublisherWorld Scientific
Pages41-62
Number of pages22
ISBN (Electronic)9789812703255
ISBN (Print)978-9-81256-493-1
DOIs
StatePublished - Oct 2005

Publication series

NameSeries in Machine Perception and Artificial Intelligence
Volume65

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Using Data Mining Technology for Terrorist Detection on the Web'. Together they form a unique fingerprint.

Cite this