Detection of Illegitimate Emails Using Boosting Algorithm (English)
- New search for: Nizamani, Sarwat
- New search for: Memon, Nasrullah
- New search for: Wiil, Uffe Kock
- New search for: Nizamani, Sarwat
- New search for: Memon, Nasrullah
- New search for: Wiil, Uffe Kock
In:
Counterterrorism and Open Source Intelligence
;
249-264
;
2011
- Article/Chapter (Book) / Electronic Resource
-
Title:Detection of Illegitimate Emails Using Boosting Algorithm
-
Contributors:
-
Published in:Lecture Notes in Social Networks ; 249-264
-
Publisher:
- New search for: Springer Vienna
-
Place of publication:Vienna
-
Publication date:2011-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Counterterrorism and Open Source Intelligence: Models, Tools, Techniques, and Case StudiesWiil, Uffe Kock et al. | 2011
- 9
-
Targeting by Transnational Terrorist GroupsGutfraind, Alexander et al. | 2011
- 33
-
A Framework for Analyst Focus from Computed SignificanceSkillicorn, David / Bourassa, M. A. J. et al. | 2011
- 49
-
Interdiction of Plots with Multiple OperativesWoo, Gordon et al. | 2011
- 61
-
Understanding Terrorist Network Topologies and Their Resilience Against DisruptionLindelauf, Roy / Borm, Peter / Hamers, Herbert et al. | 2011
- 73
-
Co-offending Network MiningBrantingham, Patricia L. / Ester, Martin / Frank, Richard / Glässer, Uwe / Tayebi, Mohammad A. et al. | 2011
- 105
-
Region-Based Geospatial Abduction with Counter-IED ApplicationsShakarian, Paulo / Subrahmanian, V. S. et al. | 2011
- 143
-
Finding Hidden Links in Terrorist Networks by Checking Indirect Links of Different Sub-NetworksChen, Alan / Gao, Shang / Karampelas, Panagiotis / Alhajj, Reda / Rokne, Jon et al. | 2011
- 159
-
The Use of Open Source Intelligence in the Construction of Covert Social NetworksRhodes, Christopher J. et al. | 2011
- 189
-
A Global Measure for Estimating the Degree of Organization and Effectiveness of Individual Actors with Application to Terrorist NetworksAghakhani, Sara / Dawoud, Khaled / Alhajj, Reda / Rokne, Jon et al. | 2011
- 223
-
Counterterrorism Mining for Individuals Semantically-Similar to Watchlist MembersDanowski, James A. et al. | 2011
- 249
-
Detection of Illegitimate Emails Using Boosting AlgorithmNizamani, Sarwat / Memon, Nasrullah / Wiil, Uffe Kock et al. | 2011
- 265
-
Cluster Based Text Classification ModelNizamani, Sarwat / Memon, Nasrullah / Wiil, Uffe Kock et al. | 2011
- 15
-
Effectiveness of Social Networks for Studying Biological Agents and Identifying Cancer BiomarkersNaji, Ghada / Nagi, Mohamad / ElSheikh, Abdallah M. / Gao, Shang / Kianmehr, Keivan / Özyer, Tansel / Rokne, Jon / Demetrick, Douglas / Ridley, Mick / Alhajj, Reda et al. | 2011
- 317
-
From Terrorism Informatics to Dark Web ResearchChen, Hsinchun et al. | 2011
- 343
-
Investigating Terrorist Attacks Using CDR Data: A Case StudyOzgul, Fatih / Celik, Ahmet / Atzenbeck, Claus / Gergin, Nadir et al. | 2011
- 355
-
Multilingual Real-time Event Extraction for Border Security Intelligence GatheringAtkinson, Martin / Piskorski, Jakub / Goot, Erik / Yangarber, Roman et al. | 2011
- 391
-
Mining the Web to Monitor the Political ConsensusNeri, Federico / Aliprandi, Carlo / Camillo, Furio et al. | 2011
- 431
-
The Ultimate Hack: Re-inventing Intelligence to Re-engineer EarthSteele, Robert David et al. | 2011