文件名称:UsingDataMiningTechniquesforDetectingTerrorRelate
下载
别用迅雷、360浏览器下载。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
如迅雷强制弹出,可右键点击选“另存为”。
失败请重下,重下不扣分。
介绍说明--下载内容均来自于网络,请自行研究使用
An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit
information is presented. The proposed methodology learns the typical behavior of terrorists by
applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used
by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The
Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a commandbased
intrusion detection system
information is presented. The proposed methodology learns the typical behavior of terrorists by
applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used
by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The
Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a commandbased
intrusion detection system
(系统自动生成,下载前可以参看下载内容)
下载文件列表
Using Data Mining Techniques for Detecting Terror-Related