LEADER 03238nam 2200649Ia 450 001 9910784044203321 005 20230617010217.0 010 $a1-281-89921-6 010 $a9786611899219 010 $a981-270-325-X 035 $a(CKB)1000000000334242 035 $a(EBL)296122 035 $a(OCoLC)476063503 035 $a(SSID)ssj0000154684 035 $a(PQKBManifestationID)11148463 035 $a(PQKBTitleCode)TC0000154684 035 $a(PQKBWorkID)10418706 035 $a(PQKB)11481545 035 $a(MiAaPQ)EBC296122 035 $a(WSP)00000804 035 $a(Au-PeEL)EBL296122 035 $a(CaPaEBR)ebr10174027 035 $a(CaONFJC)MIL189921 035 $a(EXLCZ)991000000000334242 100 $a20051228d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aFighting terror in cyberspace$b[electronic resource] /$feditors Mark Last, Abraham Kandel 210 $aNew Jersey ;$aLondon $cWorld Scientific$dc2005 215 $a1 online resource (184 p.) 225 1 $aSeries in machine perception and artificial intelligence ;$vv. 65 300 $aDescription based upon print version of record. 311 $a981-256-493-4 320 $aIncludes bibliographical references and index. 327 $aPreface; Contents; 1. Terrorism and the Internet: Use and Abuse; 2. The Radical Islam and the Cyber Jihad; 3. Using Data Mining Technology for Terrorist Detection on the Web; 4. A Content-Based Model for Web-Monitoring; 5. TDS - An Innovative Terrorist Detection System; 6. Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities; 7. Analysis of Financial Intelligence and the Detection of Terror Financing; 8. Identification of Terrorist Web Sites with Cross-Lingual Classification Tools; Appendix A Useful Sources 327 $aAppendix B Terrorist Web Sites - ExamplesAppendix C About the Authors; Index 330 $aAs became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack 410 0$aSeries in machine perception and artificial intelligence ;$vv. 65. 606 $aTerrorism$xComputer network resources 606 $aTerrorism$xPrevention 606 $aCyberterrorism$xPrevention 615 0$aTerrorism$xComputer network resources. 615 0$aTerrorism$xPrevention. 615 0$aCyberterrorism$xPrevention. 676 $a363.32 701 $aLast$b Mark$01504950 701 $aKandel$b Abraham$028590 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784044203321 996 $aFighting terror in cyberspace$93855063 997 $aUNINA