The Application of Mixed Method in Developing a Cyber Terrorism Framework.
Rabiah AhmadZahri YunosPublished in: J. Information Security (2012)
Keyphrases
- main contribution
- high accuracy
- detection method
- synthetic data
- experimental evaluation
- genetic algorithm
- segmentation method
- significant improvement
- dynamic programming
- cost function
- computationally efficient
- support vector machine
- probabilistic model
- high precision
- similarity measure
- optimization method
- fully automatic
- mutual information
- feature set
- classification accuracy
- prior knowledge
- multiresolution
- pairwise
- information technology
- preprocessing