{"title":"网络反恐框架","authors":"K. Zolfaghar, Arash Barfar, S. Mohammadi","doi":"10.1109/ICITST.2009.5402641","DOIUrl":null,"url":null,"abstract":"Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from “passive” to “active”. Consistently, this should be reflected on the Internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of “cooperation” and “universal legislation”. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using “honeypots” and “web mining” techniques.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A framework for online counter terrorism\",\"authors\":\"K. Zolfaghar, Arash Barfar, S. Mohammadi\",\"doi\":\"10.1109/ICITST.2009.5402641\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from “passive” to “active”. Consistently, this should be reflected on the Internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of “cooperation” and “universal legislation”. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using “honeypots” and “web mining” techniques.\",\"PeriodicalId\":251169,\"journal\":{\"name\":\"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2009.5402641\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2009.5402641","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from “passive” to “active”. Consistently, this should be reflected on the Internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of “cooperation” and “universal legislation”. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using “honeypots” and “web mining” techniques.