{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:17:25Z","timestamp":1725740245062},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/dmo.2012.6329790","type":"proceedings-article","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:50:43Z","timestamp":1350607843000},"page":"6-12","source":"Crossref","is-referenced-by-count":17,"title":["Topic detections in Arabic Dark websites using improved Vector Space Model"],"prefix":"10.1109","author":[{"given":"Hanan M.","family":"Alghamdi","sequence":"first","affiliation":[]},{"given":"Ali","family":"Selamat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"137","article-title":"Determination of Number of Clusters in K-Means Clustering and Application in Colour Image Segmentation","author":"ray","year":"0","journal-title":"Proceedings of the 4th International Conference on Advances in Pattern Recognition and Digital Techniques 1999"},{"journal-title":"Using the Organizational and Narrative Thread Structures in An E-Book to Support Comprehension","year":"2007","author":"sun","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-008-0135-5"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2010.5687235"},{"key":"14","first-page":"280","article-title":"Term-frequency Based Feature Selection Methods for Text Categorization","author":"xu","year":"2010","journal-title":"Fourth International Conference on Genetic and Evolutionary Computing"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.430.435"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6046-5_12"},{"key":"3","first-page":"182","author":"chen","year":"2006","journal-title":"Intelligence and Security Informatics for International Security Information Sharing and Data Mining"},{"key":"2","first-page":"379","author":"corbin","year":"2003","journal-title":"Al-Qaeda In Search of the Terror Network That Threatens the World"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71549-8_1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20838"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1938606.1938615"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2009.4925106"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9277-6"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-0388-3_16"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2010.5484774"},{"key":"8","first-page":"195","article-title":"Implementation of Intelligent Searching Using Self-Organizing Map for Webmining Used in Document Containing Information in Relation to Cyber Terrorism","author":"lim","year":"2010","journal-title":"2010 Second International Conference on Advances in Computing Control and Telecommunication Technologies"}],"event":{"name":"2012 4th Conference on Data Mining and Optimization (DMO)","start":{"date-parts":[[2012,9,2]]},"location":"Langkawi, Malaysia","end":{"date-parts":[[2012,9,4]]}},"container-title":["2012 4th Conference on Data Mining and Optimization (DMO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6322848\/6329780\/06329790.pdf?arnumber=6329790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T22:16:33Z","timestamp":1490134593000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6329790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/dmo.2012.6329790","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}