Chapter 1. Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
1.4 Conclusion and Future Directions
Chapter 2. Proactive Cyber Defense
Chapter 3. Privacy-Preserving Social Network Integration, Analysis, and Mining
3.1 Social Network Analysis and Mining
3.3 Information Integration and Privacy Preservation for SNAM
Chapter 4. A Digraph Model for Risk Identification and Management in SCADA Systems
4.3 A Digraph Model of SCADA Systems
Chapter 5. High-Level Architecture and Design of a Decision Engine for Marine Safety and Security
5.6 Conclusions and Future Work
6.3 A Collective Identity Resolution Approach
Chapter 7. Al Qaeda Terrorist Financing
7.1 Importance of Cutting Terrorist Financing
7.2 Description of Al Qaeda’s Financial Network
7.3 History and Development of Al Qaeda and its Financial Network
7.4 Organizational Structure: Control Over Finances Within Al Qaeda
7.5 Al Qaeda’s Portfolio and Sources of “Revenues”
7.6 Methods of Transferring and Storing Funds
Chapter 8. Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis
8.3 Initial Network Construction
8.4 Network Refinement Based on Interaction Relation Hypothesis
Chapter 9. Incorporating Data and Methodologies for Knowledge Discovery for Crime
9.2 Steps Involved in Crime Investigation
9.3 Data Sources for Crime Data Mining and Investigation
9.4 The Four Types of Knowledge Discovery
9.5 Knowledge Discovery Methodologies for Crime Data