Tsikrika, T., Vrochidis, S., Akhgar, B., Burnap, P., Katos, V. and Williams, M.L., 2017. 1st International Workshop on Search and Mining Terrorist Online Content and Advances in Data Science for Cyber Security and Risk on the Web. In: WSDM 2017: 10th ACM International Conference on Web Search and Data Mining, Proceedings, 6 -10 February 2017, Cambridge, UK, 823 - 824.
Full text available as:
|
PDF (This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution)
p823-tsikrika.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. 523kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
Official URL: http://www.wsdm-conference.org/2017/proceedings/
Abstract
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber deviant and cybercriminal behaviour, ranging from the spreading of extremist and terrorism-related material to online fraud and cyber security attacks, is on the rise. This workshop aims to better understand such phenomena and develop methods for tackling them in an effective and efficient manner. The workshop brings together interdisciplinary researchers and experts in Web search, security informatics, social media analysis, machine learning, and digital forensics, with particular interests in cyber security. The workshop programme includes refereed papers, invited talks and a panel discussion for better understanding the current landscape, as well as the future of data mining for detecting cyber deviance.
Item Type: | Conference or Workshop Item (UNSPECIFIED) |
---|---|
Additional Information: | This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in WSDM 2017:10th ACM International Conference on Web Search and Data Mining, Proceedings,p 823-824 |
Uncontrolled Keywords: | cybercrime; cyber security; terrorist and extremist content; data mining; security informatics |
Group: | Faculty of Science & Technology |
ID Code: | 28554 |
Deposited By: | Symplectic RT2 |
Deposited On: | 06 Apr 2017 15:47 |
Last Modified: | 14 Mar 2022 14:03 |
Downloads
Downloads per month over past year
Repository Staff Only - |