Intelligence and Security Informatics: Techniques and Applications

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research.

The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.

Author(s): Bhavani Thuraisingham (auth.), Hsinchun Chen, Christopher C. Yang (eds.)
Series: Studies in Computational Intelligence 135
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 460
Tags: Appl.Mathematics/Computational Methods of Engineering; Data Encryption; Artificial Intelligence (incl. Robotics); Electronic Commerce/e-business; Business Information Systems

Front Matter....Pages -
Assured Information Sharing: Technologies, Challenges and Directions....Pages 1-15
Automating Event Extraction for the Security Domain....Pages 17-43
Knowledge Discovery and Information Visualization for Terrorist Social Networks....Pages 45-64
Understanding the Nexus of Terrorist Web Sites....Pages 65-78
Multi-lingual Detection of Web Terrorist Content....Pages 79-96
Modeling Anticipatory Event Transitions....Pages 97-119
Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan....Pages 121-134
Identifying Interesting Networks of Criminal Activity....Pages 135-150
Name Matching in Law Enforcement Database....Pages 151-172
Discovering Investigation Clues through Mining Criminal Databases....Pages 173-198
Automated Filtering on Data Streaming for Intelligence Analysis....Pages 199-213
Personal Information Management for Intelligence Tasks....Pages 215-226
A Data Miner’s Approach to Country Corruption Analysis....Pages 227-247
Protecting Private Information in Online Social Networks....Pages 249-273
Protection of Database Security Via Collaborative Inference Detection....Pages 275-303
Suspect Vehicle Identification for Border Safety....Pages 305-318
Optimization Problems for Port-of-Entry Detection Systems....Pages 319-335
Modeling and Validation of Aviation Security....Pages 337-355
Anomaly Detection in Moving Object....Pages 357-381
Intelligent Face Recognition....Pages 383-406
Video Analysis of Vehicles and Persons for Surveillance....Pages 407-424
Video-Based Deception Detection....Pages 425-441
Back Matter....Pages -