1.

Record Nr.

UNINA9910784044203321

Titolo

Fighting terror in cyberspace [[electronic resource] /] / editors Mark Last, Abraham Kandel

Pubbl/distr/stampa

New Jersey ; ; London, : World Scientific, c2005

ISBN

1-281-89921-6

9786611899219

981-270-325-X

Descrizione fisica

1 online resource (184 p.)

Collana

Series in machine perception and artificial intelligence ; ; v. 65

Altri autori (Persone)

LastMark

KandelAbraham

Disciplina

363.32

Soggetti

Terrorism - Computer network resources

Terrorism - Prevention

Cyberterrorism - Prevention

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Preface; Contents; 1. Terrorism and the Internet: Use and Abuse; 2. The Radical Islam and the Cyber Jihad; 3. Using Data Mining Technology for Terrorist Detection on the Web; 4. A Content-Based Model for Web-Monitoring; 5. TDS - An Innovative Terrorist Detection System; 6. Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities; 7. Analysis of Financial Intelligence and the Detection of Terror Financing; 8. Identification of Terrorist Web Sites with Cross-Lingual Classification Tools; Appendix A Useful Sources

Appendix B Terrorist Web Sites - ExamplesAppendix C About the Authors; Index

Sommario/riassunto

As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around



the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack