Table of Contents

Cover image

Title page

Series Page

Copyright

Preface

Chapter 1. Revealing the Hidden World of the Dark Web: Social Media Forums and Videos

1.1 Introduction

1.2 The Dark Web Forum Portal

1.3 The Video Portal

1.4 Conclusion and Future Directions

Acknowledgments

References

Chapter 2. Proactive Cyber Defense

2.1 Introduction

2.2 Proactive Filters

2.3 Early Warning

2.4 Concluding Remarks

Acknowledgments

References

Chapter 3. Privacy-Preserving Social Network Integration, Analysis, and Mining

3.1 Social Network Analysis and Mining

3.2 Privacy Preservation

3.3 Information Integration and Privacy Preservation for SNAM

3.4 Conclusion

References

Chapter 4. A Digraph Model for Risk Identification and Management in SCADA Systems

4.1 Introduction

4.2 Background

4.3 A Digraph Model of SCADA Systems

4.4 Conclusions

References

Chapter 5. High-Level Architecture and Design of a Decision Engine for Marine Safety and Security

5.1 Introduction

5.2 Background

5.3 Conceptual Design

5.4 Formal Representation

5.5 Application

5.6 Conclusions and Future Work

Acknowledgments

References

Chapter 6. Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach

6.1 Introduction

6.2 Related Work

6.3 A Collective Identity Resolution Approach

6.4 Experiments

6.5 Concluding Remarks

References

Chapter 7. Al Qaeda Terrorist Financing

7.1 Importance of Cutting Terrorist Financing

7.2 Description of Al Qaeda’s Financial Network

7.3 History and Development of Al Qaeda and its Financial Network

7.4 Organizational Structure: Control Over Finances Within Al Qaeda

7.5 Al Qaeda’s Portfolio and Sources of “Revenues”

7.6 Methods of Transferring and Storing Funds

References

Chapter 8. Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis

8.1 Introduction

8.2 Relevant Works

8.3 Initial Network Construction

8.4 Network Refinement Based on Interaction Relation Hypothesis

8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents

8.6 Analysis and Verification

8.7 Conclusions

Acknowledgments

References

Chapter 9. Incorporating Data and Methodologies for Knowledge Discovery for Crime

9.1 Introduction

9.2 Steps Involved in Crime Investigation

9.3 Data Sources for Crime Data Mining and Investigation

9.4 The Four Types of Knowledge Discovery

9.5 Knowledge Discovery Methodologies for Crime Data

9.6 Methodologies Applied to Knowledge Discovery Types

9.7 Conclusion

References

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset