2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies 2010
DOI: 10.1109/act.2010.40
|View full text |Cite
|
Sign up to set email alerts
|

Text Classification Techniques Used to Faciliate Cyber Terrorism Investigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(17 citation statements)
references
References 1 publication
0
16
0
1
Order By: Relevance
“…For several topics related to cyberbullying detection, research has been carried out based on text mining paradigms, such as identifying online sexual predators [7], vandalism detection [8], spam detection [9] and detection of internet abuse and cyberterrorism [10]. However, very little research has been conducted on technical solutions for cyberbullying detection.…”
Section: State Of the Artmentioning
confidence: 99%
“…For several topics related to cyberbullying detection, research has been carried out based on text mining paradigms, such as identifying online sexual predators [7], vandalism detection [8], spam detection [9] and detection of internet abuse and cyberterrorism [10]. However, very little research has been conducted on technical solutions for cyberbullying detection.…”
Section: State Of the Artmentioning
confidence: 99%
“…Spawning cyber terrorism; the use of cyberspace to carry out activities classified -terroristic‖. Cyber terrorists are able to perpetrate attacks through cyber-space and the virtual world, converging the physical world and cyber space [3]. Heartened by the diminished inherent threat of capture due to the distance between theme and their victims and the difficulty of tracing back the attack to them.…”
Section: Introductionmentioning
confidence: 99%
“…Research has been also carried out based on paradigms of text mining for topics related to the detection of cyberbullying such as the detection of online sexual harassers [12], the detection of vandalism [13] or the detection of cyberterrorism [14] [15]. However, few studies have been developed to find technical solutions that allow the detection of cyberbullying.…”
Section: Related Workmentioning
confidence: 99%