Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region
暂无分享,去创建一个
[1] Maura Conway,et al. Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet , 2002, First Monday.
[2] Matthew Warren. Terrorism and the Internet , 2007 .
[3] Rong Zheng,et al. Crime Data Mining: An Overview and Case Studies , 2003, DG.O.
[4] Carl J. Ungerer,et al. Countering internet radicalisation in Southeast Asia , 2009 .
[5] Li Fan,et al. Developing a Dark Web collection and infrastructure for computational and social sciences , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.
[6] Kouichi Sakurai,et al. Combating cyber terrorism: countering cyber terrorist advantages of surprise and anonymity , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..
[7] Hsinchun Chen,et al. Content Analysis of Jihadi Extremist Groups' Videos , 2006, ISI.
[8] Rabiah Ahmad,et al. Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[9] Barbara J Mantel. Terrorism and the Internet: Should Web Sites That Promote Terrorism Be Shut Down? , 2011 .
[10] Hsinchun Chen,et al. Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[11] Maura Conway,et al. Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study , 2008, EuroISI.
[12] Hsinchun Chen,et al. A focused crawler for Dark Web forums , 2010 .
[13] Wenji Mao,et al. Automatic construction of domain theory for attack planning , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.
[14] Chunju Tseng,et al. SpidersRUs: automated development of vertical search engines in different domains and languages , 2005, Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL '05).