<span>The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informa
Intelligence and Security Informatics: Techniques and Applications
β Scribed by Bhavani Thuraisingham (auth.), Hsinchun Chen, Christopher C. Yang (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2008
- Tongue
- English
- Leaves
- 461
- Series
- Studies in Computational Intelligence 135
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research.
The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.
β¦ Table of Contents
Front Matter....Pages -
Assured Information Sharing: Technologies, Challenges and Directions....Pages 1-15
Automating Event Extraction for the Security Domain....Pages 17-43
Knowledge Discovery and Information Visualization for Terrorist Social Networks....Pages 45-64
Understanding the Nexus of Terrorist Web Sites....Pages 65-78
Multi-lingual Detection of Web Terrorist Content....Pages 79-96
Modeling Anticipatory Event Transitions....Pages 97-119
Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan....Pages 121-134
Identifying Interesting Networks of Criminal Activity....Pages 135-150
Name Matching in Law Enforcement Database....Pages 151-172
Discovering Investigation Clues through Mining Criminal Databases....Pages 173-198
Automated Filtering on Data Streaming for Intelligence Analysis....Pages 199-213
Personal Information Management for Intelligence Tasks....Pages 215-226
A Data Minerβs Approach to Country Corruption Analysis....Pages 227-247
Protecting Private Information in Online Social Networks....Pages 249-273
Protection of Database Security Via Collaborative Inference Detection....Pages 275-303
Suspect Vehicle Identification for Border Safety....Pages 305-318
Optimization Problems for Port-of-Entry Detection Systems....Pages 319-335
Modeling and Validation of Aviation Security....Pages 337-355
Anomaly Detection in Moving Object....Pages 357-381
Intelligent Face Recognition....Pages 383-406
Video Analysis of Vehicles and Persons for Surveillance....Pages 407-424
Video-Based Deception Detection....Pages 425-441
Back Matter....Pages -
β¦ Subjects
Appl.Mathematics/Computational Methods of Engineering; Data Encryption; Artificial Intelligence (incl. Robotics); Electronic Commerce/e-business; Business Information Systems
π SIMILAR VOLUMES
<p><p>This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for pr
<p>The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it explores developments and applications that are of practical use and value for Cy
Computational Intelligence: Principles, Techniques and Applications presents both theories and applications of computational intelligence in a clear, precise and highly comprehensive style. The textbook addresses the fundamental aspects of fuzzy sets and logic, neural networks, evolutionary computin