Intelligence and Security Informatics Techniques and Applications / edited by Hsinchun Chen, Christopher C. Yang.

Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of co...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Chen, Hsinchun. (Editor, http://id.loc.gov/vocabulary/relators/edt), Yang, Christopher C. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edition:1st ed. 2008.
Series:Studies in Computational Intelligence, 135
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
LEADER 05721nam a22006255i 4500
001 b3307621
003 MWH
005 20191022043000.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 |a 9783540692096 
024 7 |a 10.1007/978-3-540-69209-6  |2 doi 
035 |a (DE-He213)978-3-540-69209-6 
050 4 |a E-Book 
072 7 |a TBJ  |2 bicssc 
072 7 |a TEC009000  |2 bisacsh 
072 7 |a TBJ  |2 thema 
245 1 0 |a Intelligence and Security Informatics  |h [electronic resource] :  |b Techniques and Applications /  |c edited by Hsinchun Chen, Christopher C. Yang. 
250 |a 1st ed. 2008. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2008. 
300 |a XIII, 460 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Studies in Computational Intelligence,  |x 1860-949X ;  |v 135 
490 1 |a Springer eBook Collection 
505 0 |a Terrorism Informatics and Data Mining -- Assured Information Sharing: Technologies, Challenges and Directions -- Automating Event Extraction for the Security Domain -- Knowledge Discovery and Information Visualization for Terrorist Social Networks -- Understanding the Nexus of Terrorist Web Sites -- Multi-lingual Detection of Web Terrorist Content -- Modeling Anticipatory Event Transitions -- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan -- Intelligence and Crime Analysis -- Identifying Interesting Networks of Criminal Activity -- Name Matching in Law Enforcement Database -- Discovering Investigation Clues through Mining Criminal Databases -- Automated Filtering on Data Streaming for Intelligence Analysis -- Personal Information Management for Intelligence Tasks -- A Data Miner’s Approach to Country Corruption Analysis -- Access Control, Infrastructure Protection and Privacy -- Protecting Private Information in Online Social Networks -- Protection of Database Security Via Collaborative Inference Detection -- Suspect Vehicle Identification for Border Safety -- Optimization Problems for Port-of-Entry Detection Systems -- Modeling and Validation of Aviation Security -- Surveillance and Emergency Response -- Anomaly Detection in Moving Object -- Intelligent Face Recognition -- Video Analysis of Vehicles and Persons for Surveillance -- Video-Based Deception Detection. 
520 |a Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Applied mathematics. 
650 0 |a Engineering mathematics. 
650 0 |a Data encryption (Computer science). 
650 0 |a Artificial intelligence. 
650 0 |a E-commerce. 
650 0 |a Information technology. 
650 0 |a Business—Data processing. 
690 |a Electronic resources (E-books) 
700 1 |a Chen, Hsinchun.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Yang, Christopher C.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Studies in Computational Intelligence,  |x 1860-949X ;  |v 135 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-540-69209-6  |3 Click to view e-book 
907 |a .b33076212  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 0  |i 1 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i22207831  |z 02-26-20 
999 f f |i d7b2cabf-31d7-566c-921d-fc2fdd6ba558  |s 75a5ef7f-abdf-5c8b-a355-76fa43e4eca8 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d E-resources  |e E-Book  |h Library of Congress classification  |i Elec File  |n 1