Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
By
Jianhong Zhou
Jianhong Zhou
Search for other works by this author on:
ISBN:
9780791859919
No. of Pages:
2000
Publisher:
ASME Press
Publication date:
2011

The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training. Although there are no known reported incidents of cyberattacks on critical infrastructure as acts of terror, this could potentially become a tactic in the future. There are several methods for countering terrorist and insurgent information operations on the Internet. In this paper, the Terrorist Attack dataset using three-layer neural network trained and it is evaluated LBK method with the classification. According to the results which are obtained through three-layer neural network approaches to the methods it has better compare performance.

Abstract
Key Words
1. Introduction
2. Related Research
3. Multi Layer Perceptron Approaches
4. Experimental Results and Discussion
5. Conclusion and Future Direction
References
This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal