@inbook{7d291f8319e44d569abca5632612070f,
title = "Using Data Mining Technology for Terrorist Detection on the Web",
abstract = "The following sections are included: • Introduction: Who is Hiding in Cyber Caves? • Data Mining for Countering Terror in Cyberspace • Taxonomy of Data Mining Methods • Data Mining Needs and Challenges for Cyber Security and Cyber Intelligence • Key Techniques of Cyber Warfare • Link Analysis • Information Agents • Trend Discovery • Real- Time Data Mining • Input-Output Analysis of Software Systems • Summary • Bibliography.",
author = "Mark Last",
note = "Publisher Copyright: {\textcopyright} 2005 by World Scientific Publishing Co. Pte. Ltd.",
year = "2005",
month = oct,
doi = "10.1142/9789812703255_0003",
language = "English",
isbn = "978-9-81256-493-1",
series = "Series in Machine Perception and Artificial Intelligence",
publisher = "World Scientific",
pages = "41--62",
editor = "Mark Last and Abraham Kandel",
booktitle = "Fighting Terror In Cyberspace",
address = "United States",
}