{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:20:59Z","timestamp":1725553259978},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344780"},{"type":"electronic","value":"9783540344797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760146_47","type":"book-chapter","created":{"date-parts":[[2006,5,9]],"date-time":"2006-05-09T15:29:38Z","timestamp":1147188578000},"page":"498-503","source":"Crossref","is-referenced-by-count":6,"title":["A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan"],"prefix":"10.1007","author":[{"given":"Jau-Hwang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tianjun","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Hong-Ming","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"Wang, J.H.: Cyber Forensics \u2013 Issues and Approaches, book chapter in book: Managing Cyber Threats: Issues, Approaches and Challenge. In: Kumar, et al. (eds.). Kluwer Academic Publishers, Dordrecht (2005)"},{"key":"47_CR2","volume-title":"Investigative Data Mining for Security and Criminal Detection","author":"J. Mena","year":"2003","unstructured":"Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth Heinemann, Butterworth (2003)"},{"issue":"5","key":"47_CR3","first-page":"44","volume":"20","author":"Y. Zhou","year":"2005","unstructured":"Zhou, Y., Reid, E., Qin, J., Lai, G., Chen, H.: U.S. Domestic Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems, Special Issue on Artificial Intelligence for National and Homeland Security\u00a020(5), 44\u201351 (2005)","journal-title":"IEEE Intelligent Systems, Special Issue on Artificial Intelligence for National and Homeland Security"},{"key":"47_CR4","unstructured":"Chen, H.: The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the Dark Web and Terrorism Research Resources. Presented at the Sandia National Laboratories, August 14 (2003)"},{"key":"47_CR5","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1080\/00377990009602455","volume":"91","author":"W. Elison","year":"2000","unstructured":"Elison, W.: Netwar: Studying Rebels on the Internet. The Social Studies\u00a091, 127\u2013131 (2000)","journal-title":"The Social Studies"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Tsfati, Y., Weimann, G.: Terror on the Internet, Studies in Conflict & Terrorism 25, 317-332 (2002), \n                      \n                        http:\/\/www.terrorism.com","DOI":"10.1080\/10576100290101214"},{"key":"47_CR7","unstructured":"Weimann, G.: How Modern Terrorism Uses the Internet, Special Report 116, U.S. Institute of Peace (2004), \n                      \n                        http:\/\/usip.org\/pubs"},{"key":"47_CR8","unstructured":"Wang, J.H., et al.: A study of Automatic Search System on Cyber Crimes. Research Report to Telecommunication Bureau, Ministry of Traffic and Communication, Taiwan (1999)"},{"key":"47_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.compedu.2004.05.003","volume":"45","author":"L.P. Dringus","year":"2004","unstructured":"Dringus, L.P., Ellis, T.: Using Data Mining as a Strategy for Assessing Asynchronous Discussion Forums. Computer & Education\u00a045, 141\u2013160 (2004)","journal-title":"Computer & Education"},{"key":"47_CR10","unstructured":"Spaceman (2001), \n                      \n                        http:\/\/www.vbulletin.com\/forum\/showthread.php?t=32329"},{"key":"47_CR11","unstructured":"Bock, W.: Christmas, Communities, and Cyberspace"},{"key":"47_CR12","unstructured":"http:\/\/www.bockinfo.com\/docs\/community.htm\n                      \n                      \n                     (2001)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760146_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:08:18Z","timestamp":1619507298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760146_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344780","9783540344797"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11760146_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}