Skip to content

Security Informatics and Terrorism Patrolling the Web: Social and Technical Problems of Detecting and Controlling Terrorists' Use of the World Wide Web

Best in textbook rentals since 2012!

ISBN-10: 1586038486

ISBN-13: 9781586038489

Edition: 2008

Authors: Cecilia S. Gal, Paul B. Kantor, Bracha Shapira, North Atlantic Treaty Organization Staff

List price: $161.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This work is intended to be of interest to counter-terrorism experts and professionals, to academic researchers in information systems, computer science, political science and public policy, and to graduate students in these areas. The goal of this book is to highlight several aspects of patrolling the Web that were raised and discussed by experts from different disciplines. The book includes academic studies from related technical fields, namely, computer science and information technology, the strategic point of view as presented by intelligence experts, and finally the practical point of view by experts from related industry describing lessons learned from practical efforts to tackle…    
Customers also bought

Book details

List price: $161.00
Copyright year: 2008
Publisher: IOS Press, Incorporated
Publication date: 6/15/2008
Binding: Hardcover
Pages: 237
Size: 6.50" wide x 9.50" long x 1.00" tall
Weight: 1.386
Language: English

Editors' Introduction
The Social and Political Environment
The Internet and Terrorismp. 3
Understanding International "Cyberterrorism": A Law Enforcement Perspectivep. 8
Global Threats - Local Challenges. Current Issues of Intelligence Tasking and Coordination in the Rapidly Changing Threat Environmentp. 17
Cybercrime and Cyberterrorism as a New Security Threatp. 20
The Enemy Within: Where Are the Islamist/Jihadist Websites Hosted, and What Can Be Done About It?p. 26
Discovering Hidden Patterns of Activity
Mining Users' Web Navigation Patterns and Predicting Their Next Stepp. 45
Data Mining for Security and Crime Detectionp. 56
Enhancement to the Advanced Terrorist Detection System (ATDS)p. 71
Discovering Hidden Groups in Communication Networksp. 82
Knowledge Discovery in Texts and Images
Authorship Attribution in Law Enforcement Scenariosp. 111
Bayesian Models, Prior Knowledge, and Data Fusion for Monitoring Messages and Identifying Actorsp. 120
Entity and Relation Extraction in Texts with Semi-Supervised Extensionsp. 132
Data Compression Models for Prediction and Classificationp. 142
Security Informatics in Complex Documentsp. 156
Visual Recognition: How Can We Learn Complex Models?p. 166
Approaches for Learning Classifiers of Drifting Conceptsp. 176
Some Contemporary Technologies and Applications
Techno-Intelligence Signatures Analysisp. 193
Web Harvesting Intelligent Anti-Terror System - Technology and Methodologyp. 202
How to Protect Critical Infrastructure from Cyber-Terrorist Attacksp. 224
Conference Participantsp. 233
Author Indexp. 237
Table of Contents provided by Blackwell. All Rights Reserved.