2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies 2010
DOI: 10.1109/act.2010.35
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Intelligent Searching Using Self-Organizing Map for Webmining Used in Document Containing Information in Relation to Cyber Terrorism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
4
0
1
Order By: Relevance
“…For example, Elovici et al (2008) monitored the Internet protocol (IP) of a suspicious user and connected it to their real identity. Terrorists have also been detected based on the frequency of certain words in documents that have relevance to terrorism (Endy et al , 2010) or by using a structural and stylistic feature ranking approach (Chen, 2009). Content analysis on the dark web can be done from three viewpoints: content richness, technical complexity and web interactivity, as shown by Chen et al (2008a, b, c) and Qin et al (2007).…”
Section: Detecting Terrorist/extremists On the Webmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Elovici et al (2008) monitored the Internet protocol (IP) of a suspicious user and connected it to their real identity. Terrorists have also been detected based on the frequency of certain words in documents that have relevance to terrorism (Endy et al , 2010) or by using a structural and stylistic feature ranking approach (Chen, 2009). Content analysis on the dark web can be done from three viewpoints: content richness, technical complexity and web interactivity, as shown by Chen et al (2008a, b, c) and Qin et al (2007).…”
Section: Detecting Terrorist/extremists On the Webmentioning
confidence: 99%
“…As observed in Table 2, many studies have been performed on the dark web using content mining techniques only (Abbasi et al , 2008; Benjamin et al , 2013, 2014; Chen, 2008b, 2009; Chen et al , 2008c; Elovici et al , 2004; Endy et al , 2010; Fu et al , 2010; L'Huillier et al , 2010; Prentice et al , 2011; Scanlon, 2014; Simanjuntak et al , 2010; Yang et al , 2009). Some studies have used both structure and content mining techniques to perform feature selection, extraction or topical analysis (Bouchard et al , 2014; Chen, 2008a, b; Fu et al , 2010; Larson and Chen, 2009; Last et al , 2008; Patil et al , 2013; Reid et al , 2005; Zhang et al , 2010; Zhou et al , 2005).…”
Section: Detecting Terrorist/extremists On the Webmentioning
confidence: 99%
“…Dalam penelitian ini akan dikomparasikan kombinasi Self Organizing Map (SOM) dengan Frequent Pattern-Growth (FP-Growth), K-Medoids dengan Frequent Pattern-Growth (FP-Growth) dan Frequent Pattern-Growth (FP-Growth) yang berdiri sendiri tanpa di clustering dengan algoritma apapun sebelumnya. Algoritma Self Organizing Map (SOM) dipilih karena Self Organizing Map (SOM) merupakan algoritma clustering model aglomerative dan partitif selain itu juga dikenal sebagai algoritma non liner, teratur, pemetaan dari input data dimensi tinggi ke dalam array dimensi rendah [4][5].. Algoritma K-Medoids dipilih sebagai perbandingan untuk mendampingi Self Organizing Map (SOM) dan Frequent Pattern-Growth (FP-Growth). Pada dasarnya, algoritma clustering yang paling sering dipakai adalah K-Means.…”
Section: Pendahuluanunclassified
“…Endy et al (2010) used SOMs to visualize the topology of the data in order to perform cluster analysis of the textual documents related to cyber terrorism[57]. presented a network security evaluation model for quantitative analysis of the degree of intrusion danger level based on AIS theory, and demonstrated its advantages over traditional models for network security evaluation[58].…”
mentioning
confidence: 99%
“…Endy et al (2010) used SOMs to visualize the topology of the data in order to perform cluster analysis of the textual documents related to cyber terrorism[57]. presented a network security evaluation model for quantitative analysis of the degree of intrusion danger level based on AIS theory, and demonstrated its advantages over traditional models for network security evaluation[58].Liu et al (2011) introduced an AIS-based intrusion detection mechanism into the Internet ofThings (IoT) environment, which simulates self-adaptation and self-learning mechanisms via dynamic adaptation to the environment.…”
mentioning
confidence: 99%