Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites (English)
- New search for: Reid, Edna
- New search for: Qin, Jialun
- New search for: Zhou, Yilu
- New search for: Lai, Guanpi
- New search for: Sageman, Marc
- New search for: Weimann, Gabriel
- New search for: Chen, Hsinchun
- New search for: Reid, Edna
- New search for: Qin, Jialun
- New search for: Zhou, Yilu
- New search for: Lai, Guanpi
- New search for: Sageman, Marc
- New search for: Weimann, Gabriel
- New search for: Chen, Hsinchun
In:
Intelligence and Security Informatics
2
;
402-411
;
2005
- Article/Chapter (Book) / Electronic Resource
-
Title:Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
-
Contributors:Reid, Edna ( author ) / Qin, Jialun ( author ) / Zhou, Yilu ( author ) / Lai, Guanpi ( author ) / Sageman, Marc ( author ) / Weimann, Gabriel ( author ) / Chen, Hsinchun ( author )
-
Published in:Intelligence and Security Informatics , 2 ; 402-411Lecture Notes in Computer Science ; 3495, 2 ; 402-411
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2005-01-01
-
Size:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Collusion Set Detection Through Outlier DiscoveryJaneja, Vandana P. / Atluri, Vijayalakshmi / Vaidya, Jaideep / Adam, Nabil R. et al. | 2005
- 14
-
Digging in the Details: A Case Study in Network Data MiningGalloway, John / Simoff, Simeon J. et al. | 2005
- 27
-
Efficient Identification of Overlapping CommunitiesBaumes, Jeffrey / Goldberg, Mark / Magdon-Ismail, Malik et al. | 2005
- 37
-
Event-Driven Document Selection for Terrorism Information ExtractionSun, Zhen / Lim, Ee-Peng / Chang, Kuiyu / Ong, Teng-Kwee / Gunaratna, Rohan Kumar et al. | 2005
- 49
-
Link Analysis Tools for Intelligence and CounterterrorismBadia, Antonio / Kantardzic, Mehmed et al. | 2005
- 6
-
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical LiteratureHu, Xiaohua / Yoo, Illhoi / Rumm, Peter / Atwood, Michael et al. | 2005
- 72
-
Private Mining of Association RulesZhan, Justin / Matwin, Stan / Chang, LiWu et al. | 2005
- 81
-
Design Principles of Coordinated Multi-incident Emergency Response SystemsChen, Rui / Sharman, Raj / Rao, H. Raghav / Upadhyaya, Shambhu et al. | 2005
- 99
-
Multi-modal Biometrics with PKI Technologies for Border Control ApplicationsKwon, Taekyoung / Moon, Hyeonjoon et al. | 2005
- 115
-
Risk Management Using Behavior Based Bayesian NetworksDantu, Ram / Kolan, Prakash et al. | 2005
- 127
-
Sensitivity Analysis of an Attack Containment ModelDantu, Ram / Cangussu, João W. / Turi, Janos et al. | 2005
- 139
-
Toward a Target-Specific Method of Threat AssessmentShahar, Yael et al. | 2005
- 153
-
Incident and Casualty Databases as a Tool for Understanding Low-Intensity ConflictsRadlauer, Don et al. | 2005
- 171
-
Integrating Private Databases for Data AnalysisWang, Ke / Fung, Benjamin C. M. / Dong, Guozhu et al. | 2005
- 183
-
Applying Authorship Analysis to Arabic Web ContentAbbasi, Ahmed / Chen, Hsinchun et al. | 2005
- 198
-
Automatic Extraction of Deceptive Behavioral Cues from VideoMeservy, Thomas O. / Jensen, Matthew L. / Kruse, John / Burgoon, Judee K. / Nunamaker, Jay F. et al. | 2005
- 209
-
Automatically Determining an Anonymous Author’s Native LanguageKoppel, Moshe / Schler, Jonathan / Zigdon, Kfir et al. | 2005
- 218
-
A Cognitive Model for Alert Correlation in a Distributed EnvironmentSiraj, Ambareen / Vaughn, Rayford B. et al. | 2005
- 231
-
Beyond Keyword Filtering for Message and Conversation DetectionSkillicorn, D. B. et al. | 2005
- 244
-
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)Elovici, Yuval / Shapira, Bracha / Last, Mark / Zaafrany, Omer / Friedman, Menahem / Schneider, Moti / Kandel, Abraham et al. | 2005
- 256
-
Modeling and Multiway Analysis of Chatroom TensorsAcar, Evrim / Çamtepe, Seyit A. / Krishnamoorthy, Mukkai S. / Yener, Bülent et al. | 2005
- 269
-
Selective Fusion for Speaker Verification in SurveillanceSolewicz, Yosef A. / Koppel, Moshe et al. | 2005
- 280
-
A New Conceptual Framework to Resolve Terrorism’s Root CausesSinai, Joshua et al. | 2005
- 287
-
Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad NetworkQin, Jialun / Xu, Jennifer J. / Hu, Daning / Sageman, Marc / Chen, Hsinchun et al. | 2005
- 305
-
A Conceptual Model of Counterterrorist OperationsDavis, David / Frendak-Blume, Allison / Wheeler, Jennifer / Woodcock, Alexander E. R. / Worrell, Clarence III et al. | 2005
- 316
-
Measuring Success in Countering Terrorism: Problems and PitfallsProbst, Peter S. et al. | 2005
- 322
-
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions AnalysisReid, Edna / Chen, Hsinchun et al. | 2005
- 340
-
Testing a Rational Choice Model of Airline HijackingsDugan, Laura / LaFree, Gary / Piquero, Alex R. et al. | 2005
- 362
-
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning AlgorithmsKayacık, H. Güneş / Zincir-Heywood, Nur et al. | 2005
- 368
-
Discovering Identity Problems: A Case StudyWang, Alan G. / Atabakhsh, Homa / Petersen, Tim / Chen, Hsinchun et al. | 2005
- 374
-
Efficient Discovery of New Information in Large Text DatabasesBradford, R. B. et al. | 2005
- 381
-
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous ContentYilmazel, Ozgur / Symonenko, Svetlana / Balasubramanian, Niranjan / Liddy, Elizabeth D. et al. | 2005
- 389
-
LSI-Based Taxonomy Generation: The Taxonomist SystemWnek, Janusz et al. | 2005
- 395
-
Some Marginal Learning Algorithms for Unsupervised ProblemsTao, Qing / Wu, Gao-Wei / Wang, Fei-Yue / Wang, Jue et al. | 2005
- 402
-
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad WebsitesReid, Edna / Qin, Jialun / Zhou, Yilu / Lai, Guanpi / Sageman, Marc / Weimann, Gabriel / Chen, Hsinchun et al. | 2005
- 412
-
Evaluating an Infectious Disease Information Sharing and Analysis SystemHu, Paul Jen-Hwa / Zeng, Daniel / Chen, Hsinchun / Larson, Catherine / Chang, Wei / Tseng, Chunju et al. | 2005
- 418
-
How Question Answering Technology Helps to Locate Malevolent Online ContentRoussinov, Dmitri / Robles-Flores, Jose Antonio et al. | 2005
- 422
-
Information Supply Chain: A Unified Framework for Information-SharingSun, Shuang / Yen, John et al. | 2005
- 429
-
Map-Mediated GeoCollaborative Crisis ManagementCai, Guoray / MacEachren, Alan M. / Brewer, Isaac / McNeese, Mike / Sharma, Rajeev / Fuhrmann, Sven et al. | 2005
- 436
-
Thematic Indicators Derived from World News ReportsBest, Clive / Goot, Erik / Paola, Monica et al. | 2005
- 448
-
A Novel Watermarking Algorithm Based on SVD and Zernike MomentsLi, Haifeng / Wang, Shuxun / Song, Weiwei / Wen, Quan et al. | 2005
- 454
-
A Survey of Software WatermarkingZhu, William / Thomborson, Clark / Wang, Fei-Yue et al. | 2005
- 459
-
Data Distortion for Privacy Protection in a Terrorist Analysis SystemXu, Shuting / Zhang, Jun / Han, Dianwei / Wang, Jie et al. | 2005
- 465
-
Deception Across Cultures: Bottom-Up and Top-Down ApproachesZhou, Lina / Lutterbie, Simon et al. | 2005
- 471
-
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act ProfilingTwitchell, Douglas P. / Forsgren, Nicole / Wiers, Karl / Burgoon, Judee K. / Nunmaker, Jay F. et al. | 2005
- 479
-
Active Automation of the DITSCAPLee, Seok Won / Gandhi, Robin A. / Ahn, Gail-Joon / Yavagal, Deepak S. et al. | 2005
- 486
-
An Ontological Approach to the Document Access Problem of Insider ThreatAleman-Meza, Boanerges / Burns, Phillip / Eavenson, Matthew / Palaniswami, Devanand / Sheth, Amit et al. | 2005
- 492
-
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information FirewallConti, Gregory / Ahamad, Mustaque / Norback, Robert et al. | 2005
- 498
-
Intrusion Detection System Using Sequence and Set Preserving MetricKumar, Pradeep / Rao, M. Venkateswara / Krishna, P. Radha / Bapi, Raju S. / Laha, Arijit et al. | 2005
- 505
-
The Multi-fractal Nature of Worm and Normal Traffic at Individual Source LevelChen, Yufeng / Dong, Yabo / Lu, Dongming / Pan, Yunhe et al. | 2005
- 511
-
Learning Classifiers for Misuse Detection Using a Bag of System Calls RepresentationKang, Dae-Ki / Fuller, Doug / Honavar, Vasant et al. | 2005
- 517
-
A Jackson Network-Based Model for Quantitative Analysis of Network SecurityXiang, Zhengtao / Chen, Yufeng / Jian, Wei / Yan, Fei et al. | 2005
- 523
-
Biomonitoring, Phylogenetics and Anomaly Aggregation SystemsStockwell, David R. B. / Wang, Jason T. L. et al. | 2005
- 530
-
CODESSEAL: Compiler/FPGA Approach to Secure ApplicationsGelbart, Olga / Ott, Paul / Narahari, Bhagirath / Simha, Rahul / Choudhary, Alok / Zambreno, Joseph et al. | 2005
- 536
-
Computational Tool in Infrastructure Emergency Total Evacuation AnalysisWong, Kelvin H. L. / Luo, Mingchun et al. | 2005
- 543
-
Performance Study of a Compiler/Hardware Approach to Embedded Systems SecurityMohan, Kripashankar / Narahari, Bhagirath / Simha, Rahul / Ott, Paul / Choudhary, Alok / Zambreno, Joseph et al. | 2005
- 549
-
A Secured Mobile Phone Based on Embedded Fingerprint Recognition SystemsChen, Xinjian / Tian, Jie / Su, Qi / Yang, Xin / Wang, Fei Yue et al. | 2005
- 554
-
Connections in the World of International TerrorismShahar, Yael et al. | 2005
- 561
-
Forecasting Terrorism: Indicators and Proven Analytic TechniquesKhalsa, Sundri K. et al. | 2005
- 567
-
Forecasting Terrorist Groups’ Warfare: ‘Conventional’ to CBRNSinai, Joshua et al. | 2005
- 571
-
The Qualitative Challenge of Insurgency InformaticsTousley, Scott et al. | 2005
- 579
-
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related EventsLatino, Robert J. et al. | 2005
- 590
-
A Group Decision-Support Method for Search and Rescue Based on Markov ChainShen, Huizhang / Zhao, Jidi / Peng, Ying et al. | 2005
- 593
-
A New Relationship Form in Data MiningKooptiwoot, Suwimon / Salam, Muhammad Abdus et al. | 2005
- 595
-
A Study of ”Root Causes of Conflict” Using Latent Semantic AnalysisBobeica, Mihaela / Jéral, Jean-Paul / Garcia, Teofilo / Best, Clive et al. | 2005
- 597
-
An Empirical Study on Dynamic Effects on Deception DetectionQin, Tiantian / Burgoon, Judee K. et al. | 2005
- 600
-
Anti Money Laundering Reporting and Investigation – Sorting the Wheat from the ChaffCanhoto, Ana Isabel / Backhouse, James et al. | 2005
- 602
-
Application of Latent Semantic Indexing to Processing of Noisy TextPrice, Robert. J. / Zukas, Anthony. E. et al. | 2005
- 604
-
Detecting Misuse of Information Retrieval Systems Using Data Mining TechniquesGoharian, Nazli / Ma, Ling / Meyers, Chris et al. | 2005
- 606
-
Mining Schemas in Semistructured Data Using Fuzzy Decision TreesSun, Wei / Liu, Da-xin et al. | 2005
- 608
-
More Than a Summary: Stance-Shift AnalysisDavis, Boyd / Lord, Vivian / Mason, Peyton et al. | 2005
- 610
-
Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile RobotsHou, Zeng-Guang et al. | 2005
- 612
-
BioPortal: Sharing and Analyzing Infectious Disease InformationZeng, Daniel / Chen, Hsinchun / Tseng, Chunju / Larson, Catherine / Chang, Wei / Eidson, Millicent / Gotham, Ivan / Lynch, Cecil / Ascher, Michael et al. | 2005
- 614
-
DIANE: Revolutionizing the Way We Collect, Analyze, and Share InformationZhu, Jin et al. | 2005
- 617
-
Processing High-Speed Intelligence Feeds in Real-TimeDemers, Alan / Gehrke, Johannes / Hong, Mingsheng / Riedewald, Mirek et al. | 2005
- 619
-
Question Answer TARA: A Terrorism Activity Resource ApplicationSchumaker, Rob / Chen, Hsinchun et al. | 2005
- 621
-
Template Based Semantic Similarity for Security ApplicationsAleman-Meza, Boanerges / Halaschek-Wiener, Christian / Sahoo, Satya Sanket / Sheth, Amit / Arpinar, I. Budak et al. | 2005
- 623
-
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the WebQin, Jialun / Zhou, Yilu / Lai, Guanpi / Reid, Edna / Sageman, Marc / Chen, Hsinchun et al. | 2005
- 625
-
Toward an ITS Specific Knowledge EngineLai, Guanpi / Wang, Fei-Yue et al. | 2005
- 627
-
A Blind Image Watermarking Using for Copyright Protection and TracingLi, Haifeng / Wang, Shuxun / Song, Weiwei / Wen, Quan et al. | 2005
- 629
-
Towards an Effective Wireless Security Policy for Sensitive OrganizationsManley, Michael / McEntee, Cheri / Molet, Anthony / Park, Joon S. et al. | 2005
- 631
-
A Taxonomy of Cyber Attacks on 3G NetworksKotapati, Kameswari / Liu, Peng / Sun, Yan / LaPorta, Thomas F. et al. | 2005
- 634
-
An Adaptive Approach to Handle DoS Attack for Web ServicesIm, Eul Gyu / Song, Yong Ho et al. | 2005
- 636
-
An Architecture for Network Security Using Feedback ControlDantu, Ram / Cangussu, João W. et al. | 2005
- 638
-
Defending a Web Browser Against Spying with Browser Helper ObjectsPark, Beomsoo / Hong, Sungjin / Oh, Jaewook / Lee, Heejo et al. | 2005
- 640
-
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the InternetXia, ZhengYou / Jiang, YiChuan / Wang, Jian et al. | 2005
- 642
-
Enhancing Spatial Database Access Control by Eliminating the Covert Topology ChannelOh, Young-Hwan / Bae, Hae-Young et al. | 2005
- 644
-
Gathering Digital Evidence in Response to Information Security IncidentsWang, Shiuh-Jeng / Yang, Cheng-Hsing et al. | 2005
- 646
-
On the QP Algorithm in Software WatermarkingZhu, William / Thomborson, Clark et al. | 2005
- 648
-
On the Use of Opaque Predicates in Mobile Agent Code ObfuscationMajumdar, Anirban / Thomborson, Clark et al. | 2005
- 650
-
Secure Contents Distribution Using Flash Memory TechnologySong, Yong Ho / Im, Eul Gyu et al. | 2005
- 652
-
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and VulnerabilitiesSmith, Richard. A. et al. | 2005
- 654
-
Securing Grid-Based Critical InfrastructuresNaqvi, Syed / Riguidel, Michel et al. | 2005
- 656
-
The Safety Alliance of Cushing – A Model Example of Cooperation as an Effective Counterterrorism ToolZimmermann, David et al. | 2005
- 658
-
A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining TechniquesGong, Xiaoyan / Gao, Haijun et al. | 2005
- 660
-
An Agent-Based Framework for a Traffic Security Management SystemTang, Shuming / Gao, Haijun et al. | 2005
- 662
-
Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving VehicleQiao, Hong / Wang, Fei-Yue / Cao, Xianbin. et al. | 2005
- 664
-
Application of Cooperative Co-evolution in Pedestrian Detection SystemsCao, Xianbin / Qiao, Hong / Wang, Fei-Yue / Zhang, Xinzheng et al. | 2005
- 666
-
Biometric Fingerprints Based Radio Frequency IdentificationJayakumar, Sundaram / Senthilkumar, Chandramohan et al. | 2005
- 669
-
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and VisualizationKaza, Siddharth / Marshall, Byron / Xu, Jennifer / Wang, Alan G. / Gowda, Hemanth / Atabakhsh, Homa / Petersen, Tim / Violette, Chuck / Chen, Hsinchun et al. | 2005