Fighting Terror in Cyberspace最新文献

筛选
英文 中文
Fighting Terror in Cyberspace 打击网络恐怖主义
Fighting Terror in Cyberspace Pub Date : 2005-10-01 DOI: 10.1142/5934
A. Kandel
{"title":"Fighting Terror in Cyberspace","authors":"A. Kandel","doi":"10.1142/5934","DOIUrl":"https://doi.org/10.1142/5934","url":null,"abstract":"","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123371375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of Financial Intelligence and the Detection of Terror Financing 金融情报分析与恐怖融资侦查
Fighting Terror in Cyberspace Pub Date : 1900-01-01 DOI: 10.1142/9789812703255_0007
Yehuda Shaffer
{"title":"Analysis of Financial Intelligence and the Detection of Terror Financing","authors":"Yehuda Shaffer","doi":"10.1142/9789812703255_0007","DOIUrl":"https://doi.org/10.1142/9789812703255_0007","url":null,"abstract":"","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132866386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Data Mining Technology for Terrorist Detection on the Web 数据挖掘技术在网络恐怖分子检测中的应用
Fighting Terror in Cyberspace Pub Date : 1900-01-01 DOI: 10.1142/9789812703255_0003
Mark Last
{"title":"Using Data Mining Technology for Terrorist Detection on the Web","authors":"Mark Last","doi":"10.1142/9789812703255_0003","DOIUrl":"https://doi.org/10.1142/9789812703255_0003","url":null,"abstract":"","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133205783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Radical Islam and the Cyber Jihad 激进伊斯兰和网络圣战
Fighting Terror in Cyberspace Pub Date : 1900-01-01 DOI: 10.1142/9789812703255_0002
Shaul Shay
{"title":"The Radical Islam and the Cyber Jihad","authors":"Shaul Shay","doi":"10.1142/9789812703255_0002","DOIUrl":"https://doi.org/10.1142/9789812703255_0002","url":null,"abstract":"","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133756141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Terrorism and the Internet: Use and Abuse 恐怖主义和互联网:使用和滥用
Fighting Terror in Cyberspace Pub Date : 1900-01-01 DOI: 10.1142/9789812703255_0001
Abraham R. Wagner
{"title":"Terrorism and the Internet: Use and Abuse","authors":"Abraham R. Wagner","doi":"10.1142/9789812703255_0001","DOIUrl":"https://doi.org/10.1142/9789812703255_0001","url":null,"abstract":"What began as an MIT doctoral dissertation in 1962, and a U.S. Defense Department experiment in communications in the years that followed, has evolved into a technological revolution now known as \"cyberspace\" and the Internet. It is indeed a revolution that goes far beyond communications. In terms of making media available to people worldwide, it is likely the most significant advance since Gutenberg's invention of moveable type in the 1 5 ~ ~ century. Use of the Internet has literally exploded from a handful of scientists in the U.S. to a world where \"net\" access is almost universal. The net has become a medium for all the good, the bad and the ugly, and terrorists are no exception. Terrorists, terrorist organizations and their sponsors have all become increasing users of the Internet for a variety of functions. Just as in years past, when terrorists relied on other technologies such as telephone, radio, the mails and other systems, they cannot be barred from net access and will continue to use net resources for their purposes. The present paper explores the evolution of the Internet; current terrorist uses of the net; and what may be possible in terms of counter-terrorist operations in this area.","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Content-Based Model for Web-Monitoring 基于内容的web监控模型
Fighting Terror in Cyberspace Pub Date : 1900-01-01 DOI: 10.1142/9789812703255_0004
Bracha Shapira
{"title":"A Content-Based Model for Web-Monitoring","authors":"Bracha Shapira","doi":"10.1142/9789812703255_0004","DOIUrl":"https://doi.org/10.1142/9789812703255_0004","url":null,"abstract":"","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134142198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification of Terrorist Web Sites with Cross-Lingual Classification Tools 用跨语言分类工具识别恐怖主义网站
Fighting Terror in Cyberspace Pub Date : 1900-01-01 DOI: 10.1142/9789812703255_0008
A. Markov, Mark Last
{"title":"Identification of Terrorist Web Sites with Cross-Lingual Classification Tools","authors":"A. Markov, Mark Last","doi":"10.1142/9789812703255_0008","DOIUrl":"https://doi.org/10.1142/9789812703255_0008","url":null,"abstract":"","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124998463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TDS - An Innovative Terrorist Detection System TDS -一个创新的恐怖分子探测系统
Fighting Terror in Cyberspace Pub Date : 1900-01-01 DOI: 10.1142/9789812703255_0005
Y. Elovici
{"title":"TDS - An Innovative Terrorist Detection System","authors":"Y. Elovici","doi":"10.1142/9789812703255_0005","DOIUrl":"https://doi.org/10.1142/9789812703255_0005","url":null,"abstract":"","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126228994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities 变长向量聚类算法及其在恐怖活动检测中的应用
Fighting Terror in Cyberspace Pub Date : 1900-01-01 DOI: 10.1142/9789812703255_0006
M. Friedman, Moti Schneider, A. Kandel
{"title":"Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities","authors":"M. Friedman, Moti Schneider, A. Kandel","doi":"10.1142/9789812703255_0006","DOIUrl":"https://doi.org/10.1142/9789812703255_0006","url":null,"abstract":"","PeriodicalId":353700,"journal":{"name":"Fighting Terror in Cyberspace","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133177545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信