Abstract is missing.
- Fuzzy Logic, Uncertainty Management and The Black SwanAbraham Kandel. 3-11 [doi]
- World Financial Crisis and its Influence on Terror FinancingJosef Bollag. 13-18 [doi]
- Terrorist Facebook: Terrorists and Online Social NetworkingGabriel Weimann. 19-29 [doi]
- Al Qaeda and the Hybrid JihadShaul Shay. 31-35 [doi]
- Cyber Criminal Mechanisms Employed in Social Engineering and Technical TricksArtak Barseghyan. 37-51 [doi]
- Threat Early Warning through Web MiningClive Best. 55-65 [doi]
- Discover Shadow Groups from the Dark WebDaniel Hladky, Christian Ehrlich, Irina Efimenko, Vyacheslav Vorobyov. 67-81 [doi]
- Toward Real Time Internet Traffic MonitoringBenny Porat, Ely Porat. 83-92 [doi]
- Investigation of Web Based Hidden DataGevorg Margarov. 93-107 [doi]
- Preventing Internet Banking Fraud and Money Laundering Using Customer Trustability IndexM. Hamdi Özçelik, Ekrem Duman. 109-122 [doi]
- Knowledge Discovery from Data StreamsJoão Gama, Pedro Pereira Rodrigues, Eduardo J. Spinosa, André Carlos Ponce Leon Ferreira de Carvalho. 125-138 [doi]
- Methods for Interactive Exploration of Large-Scale News StreamsDaniel A. Keim, Milos Krstajic, Peter Bak, Daniela Oelke, Florian Mansmann. 139-154 [doi]
- Development of Fuzzy System Models: Fuzzy Rulebases to Fuzzy FunctionsI. Burhan Türksen. 155-168 [doi]
- Some Fuzzy Logic Based Approaches to Flexible Database Querying and their Use for Discovering Security Related InformationJanusz Kacprzyk, Slawomir Zadrozny. 169-188 [doi]
- Privacy in Query LogsRicardo A. Baeza-Yates. 189-193 [doi]
- Making Sense of Unstructured Textual DataDan Roth. 195-206 [doi]
- Language-independent Techniques for Automated Text SummarizationMark Last. 207-237 [doi]
- Ontology Driven Multilingual Information Extraction and Intelligent AnalyticsVladimir F. Khoroshevsky. 239-262 [doi]