메뉴 건너뛰기




Volumn 4430 LNCS, Issue , 2007, Pages 1-20

Exploring extremism and terrorism on the web: The Dark Web project

Author keywords

Dark web; Intelligence and security informatics; Terrorism informatics

Indexed keywords

DATABASE SYSTEMS; MULTIMEDIA SYSTEMS; PROJECT MANAGEMENT; SECURITY OF DATA;

EID: 38049098573     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 1
    • 0035789623 scopus 로고    scopus 로고
    • Data mining case study: Modeling the behavior of offenders who commit serious sexual assaults
    • F. Provost & R. Srikant Eds, New York: Association for Computing Machinery
    • Adderley, R., & Musgrove, P. B. (2001). Data mining case study: Modeling the behavior of offenders who commit serious sexual assaults. In F. Provost & R. Srikant (Eds.), Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 215-220). New York: Association for Computing Machinery.
    • (2001) Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 215-220
    • Adderley, R.1    Musgrove, P.B.2
  • 2
    • 0013182812 scopus 로고
    • A new algorithm to generate Arabic root-pattern forms
    • King Fahd University of Petroleum & Minerals, Dhahran, Saudi Arabia, pp
    • Al-Fedaghi Saban S. and Al-Anzi, F. (1989) A new algorithm to generate Arabic root-pattern forms. Proceedings of the 11th National Computer Conference, King Fahd University of Petroleum & Minerals, Dhahran, Saudi Arabia, (pp. 4-7).
    • (1989) Proceedings of the 11th National Computer Conference , pp. 4-7
    • Al-Fedaghi Saban, S.1    Al-Anzi, F.2
  • 3
    • 28844465409 scopus 로고    scopus 로고
    • American Civil Liberties Union, Retrieved July 27, 2004, from the World Wide Web
    • American Civil Liberties Union. (2004). MATRIX: Myths and reality. Retrieved July 27, 2004, from the World Wide Web: http://www.aclu.org/Privacy/ Privacy.cfm?ID=14894&c=130
    • (2004) MATRIX: Myths and reality
  • 4
    • 38049183137 scopus 로고    scopus 로고
    • Arquilla, J. & Ronfeldt, D. F. Advent of Netwar. (1996). Rand Report, http://www.rand.org/.
    • Arquilla, J. & Ronfeldt, D. F. Advent of Netwar. (1996). Rand Report, http://www.rand.org/.
  • 8
    • 38049172922 scopus 로고    scopus 로고
    • Chen, H. & Xu, J. (2005) Intelligence and security informatics for national security: a knowledge discovery perspective, In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), 40. Information Today, Inc., Medford, New Jersey.
    • Chen, H. & Xu, J. (2005) Intelligence and security informatics for national security: a knowledge discovery perspective, In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), Volume 40. Information Today, Inc., Medford, New Jersey.
  • 9
    • 20344384393 scopus 로고    scopus 로고
    • Social, ethical and legal issues of data mining
    • J. Wang Ed, Hershey, PA: Idea Group Publishing
    • Cook, J. S., & Cook, L. L. (2003). Social, ethical and legal issues of data mining. In J. Wang (Ed.), Data mining: Opportunities and challenges (pp. 395-420). Hershey, PA: Idea Group Publishing.
    • (2003) Data mining: Opportunities and challenges , pp. 395-420
    • Cook, J.S.1    Cook, L.L.2
  • 10
    • 24944437168 scopus 로고    scopus 로고
    • Netwar: Studying Rebels on the Internet
    • Elison, W. (2000) Netwar: Studying Rebels on the Internet. The Social Studies 91, 127-131.
    • (2000) The Social Studies , vol.91 , pp. 127-131
    • Elison, W.1
  • 11
    • 0002389633 scopus 로고    scopus 로고
    • Automating the analysis and cataloging of sky surveys
    • U. Fayyad, G. Piatetsky-Shapiro, P. Smyth & R. Uthurusamy Eds, Menlo Park, CA: AAAI Press
    • Fayyad, U. M., Djorgovshi, S. G., & Weir, N. (1996). Automating the analysis and cataloging of sky surveys. In U. Fayyad, G. Piatetsky-Shapiro, P. Smyth & R. Uthurusamy (Eds.), Advances in knowledge discovery and data mining (pp. 471-493). Menlo Park, CA: AAAI Press.
    • (1996) Advances in knowledge discovery and data mining , pp. 471-493
    • Fayyad, U.M.1    Djorgovshi, S.G.2    Weir, N.3
  • 12
    • 0041912948 scopus 로고    scopus 로고
    • Evolving data mining into solutions for insights
    • Fayyad, U. M., & Uthurusamy, R. (2002). Evolving data mining into solutions for insights. Communications of the ACM, 45(8), 28-31.
    • (2002) Communications of the ACM , vol.45 , Issue.8 , pp. 28-31
    • Fayyad, U.M.1    Uthurusamy, R.2
  • 13
    • 0031617713 scopus 로고    scopus 로고
    • Inferring Web communities from link topology
    • R. Akscyn, D. McCracken, & E. Yoder Eds, New York: Association for Computing Machinery
    • Gibson, D., Kleinberg, J., & Raghavan, P. (1998). Inferring Web communities from link topology. In R. Akscyn, D. McCracken, & E. Yoder (Eds.), Proceedings of the 9th ACM Conference on Hypertext and Hypermedia (pp. 225-234). New York: Association for Computing Machinery.
    • (1998) Proceedings of the 9th ACM Conference on Hypertext and Hypermedia , pp. 225-234
    • Gibson, D.1    Kleinberg, J.2    Raghavan, P.3
  • 15
    • 0011450426 scopus 로고    scopus 로고
    • Office of Homeland Security, Washington D.C, Office of Homeland Security
    • Office of Homeland Security. (2002). National Strategy for Homeland Security. Washington D.C.: Office of Homeland Security.
    • (2002) National Strategy for Homeland Security
  • 17
    • 35048854724 scopus 로고    scopus 로고
    • Terrorism Knowledge Discovery Project: A knowledge discovery approach to address the threats of terrorism
    • H. Chen, R. Moore, D. Zeng & J. Leavitt Eds, Berlin: Springer
    • Reid, E. O. F., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., et al. (2004). Terrorism Knowledge Discovery Project: A knowledge discovery approach to address the threats of terrorism. In H. Chen, R. Moore, D. Zeng & J. Leavitt (Eds.), Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04) (pp. 125-145). Berlin: Springer.
    • (2004) Proceedings of the Second Symposium on Intelligence and Security Informatics (ISI'04) , pp. 125-145
    • Reid, E.O.F.1    Qin, J.2    Chung, W.3    Xu, J.4    Zhou, Y.5    Schumaker, R.6
  • 18
    • 3843140883 scopus 로고    scopus 로고
    • Computer-based authorship attribution without lexical measures
    • Stamatatos, E., Fakotakis, N., & Kokkinakis, G. (2001). Computer-based authorship attribution without lexical measures. Computers and the Humanities, 35(2), (pp. 193-214).
    • (2001) Computers and the Humanities , vol.35 , Issue.2 , pp. 193-214
    • Stamatatos, E.1    Fakotakis, N.2    Kokkinakis, G.3
  • 19
    • 10044256201 scopus 로고    scopus 로고
    • Strickland, L. S., Baldwin, D. A., & Justsen, M. (2005) Domestic security surveillance and civil liberties, In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), 39. Information Today, Inc., Medford, New Jersey.
    • Strickland, L. S., Baldwin, D. A., & Justsen, M. (2005) Domestic security surveillance and civil liberties, In B. Cronin (Ed.), Annual Review of Information Science and Technology (ARIST), Volume 39. Information Today, Inc., Medford, New Jersey.
  • 20
    • 0033874603 scopus 로고    scopus 로고
    • Comparing noun phrasing techniques for use with medical digital library tools
    • Tolle, K. M., & Chen, H. (2000). Comparing noun phrasing techniques for use with medical digital library tools. Journal of the American Society for Information Science, 57(4), 352-370.
    • (2000) Journal of the American Society for Information Science , vol.57 , Issue.4 , pp. 352-370
    • Tolle, K.M.1    Chen, H.2
  • 21
    • 84950351930 scopus 로고
    • Multidimensional scaling: Theory and method
    • Torgerson, W. S. (1952). Multidimensional scaling: Theory and method. Psychometrika, 17, 401-419.
    • (1952) Psychometrika , vol.17 , pp. 401-419
    • Torgerson, W.S.1
  • 22
    • 0033474337 scopus 로고    scopus 로고
    • Trybula, W. J. (1999). Text mining. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (ARIST) (34, pp. 385-419). Medford, NJ: Information Today, Inc.
    • Trybula, W. J. (1999). Text mining. In M. E. Williams (Ed.), Annual Review of Information Science and Technology (ARIST) (vol. 34, pp. 385-419). Medford, NJ: Information Today, Inc.
  • 24
    • 38049155870 scopus 로고    scopus 로고
    • Weimann, G. (2004). www.terrorism.net: How Modern Terrorism Uses the Internet. Special Report 116, U.S. Institute of Peace.
    • Weimann, G. (2004). www.terrorism.net: How Modern Terrorism Uses the Internet. Special Report 116, U.S. Institute of Peace.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.