TEXT CLASSIFICATION TECHNIQUES USED TO FACILITATE
CYBER TERRORISM INVESTIGATION Page 74 of 135
David Allister Simanjuntak
7 REFERENCES
Colarik, A. M. & L. J. Janczewski, Cyber Warfare and Cyber Terrorism. Hershey PA: IGI Global, 2008.
Conway, Maura. ―Reality Bites: Cyberterrorism and Terrorist ‗Use‘ of the Internet.‖ 2002. http://doras.dcu.ie/498/1/first_mon_7_11_2002.pdf, accessed March 15, 2010.
Denning, Dorothy E. ―CYBERTERRORISM. Testimony before the Special Oversight Panel on Terrorist Committee on Armed Services U.S. House of Representatives‖ Georgetown University, May 23, 2000.
http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html, accessed May 2, 2010.
Etzioni, Oren. ―The World Wide Web: quagmire or gold mine?‖ Comm. of ACM (November, 1996).
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.4031, accessed May 4, 2010.
Fürnkranz, Johannes. ―Web Mining.‖ 2005.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.2029, accessed May 4, 2010.
Joachim, Thorsten. ―Text Categorization with Support Vector Machines:
Learning with Many Relevant Features.‖ 1997.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6124, accessed April 7, 2010.
Joachim, Thorsten. Learning to Classify Text Using Support Vector Machines.
Massachusetts: Kluwer Academic Publisher, 2002.
TEXT CLASSIFICATION TECHNIQUES USED TO FACILITATE
CYBER TERRORISM INVESTIGATION Page 75 of 135
David Allister Simanjuntak
Liu, B., X. Li, W.S. Lee, and P.S. Yu. ―Text Classification by Labelling Words‖
2004. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.572, accessed June 26, 2010.
Liu, H. & H. Motoda. Feature Selection for Knowledge Discovery and Data Mining. Massachusetts: Kluwer Academic Publisher, 1998.
Nugroho, A. S. ―Pengantar Support Vector Machine.‖ Research Note (unpublished), 2007.
Prichard, J.J., and L.E. Macdonald. ―Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks.‖ Journal of Information Technology Education Volume 3 (2004).
http://informingscience.org/jite/documents/Vol3/v3p279-289-150.pdf, accessed January 10, 2010.
Russel, S.J. & P. Norvig. Artificial Intelligence: A Modern Approach. New Jersey: Prentice-Hall, Inc., 1995.
Schneider, Karl-Michael. ―Techniques for Improving the Performance of Naïve Bayes for Text Classification.‖ 2005.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.2085, accessed June, 2010.
Tan, P.-N., M. Steinbach, and V. Kumar. Introduction to Data Mining, Boston, MA: Pearson Education, Inc., 2006.
Thuraisingham, Bhavani. ―Chapter 3Data-Mining for Counter Terrorism.‖
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.9521, accessed April, 2010.
TEXT CLASSIFICATION TECHNIQUES USED TO FACILITATE
CYBER TERRORISM INVESTIGATION Page 76 of 135
David Allister Simanjuntak
Weiss, S.M., N. Indurkhya, T. Zang, and F. J. Damerau. Text Mining Predictive Methods for Analyzing Unstructured Information. New York: Springer, 2005.
Witten, I.H., and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques, Second Edition. San Francisco, CA: Elsevier Inc. All rights reserved, 2005.
Wulandini, F. & A. S. Nugroho. ―Text Classification Using Support Vector Machine for Webmining Based Spatio Temporal Analysis of the Spread of Tropical Diseases‖, Proceedings of International Conference on Rural Information and Communication Technology (2009), pp. 189 – 192.
Yang, Y., & J.O. Pedersen. ―A Comparative Study on Feature Selection in Text Categorization.‖ 1997.
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.32.9956, accessed June, 2010.