Intelligence and Security Informatics Techniques and Applications / edited by Hsinchun Chen, Christopher C. Yang.

Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of co...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Chen, Hsinchun. (Editor, http://id.loc.gov/vocabulary/relators/edt), Yang, Christopher C. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edition:1st ed. 2008.
Series:Studies in Computational Intelligence, 135
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Terrorism Informatics and Data Mining
  • Assured Information Sharing: Technologies, Challenges and Directions
  • Automating Event Extraction for the Security Domain
  • Knowledge Discovery and Information Visualization for Terrorist Social Networks
  • Understanding the Nexus of Terrorist Web Sites
  • Multi-lingual Detection of Web Terrorist Content
  • Modeling Anticipatory Event Transitions
  • Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan
  • Intelligence and Crime Analysis
  • Identifying Interesting Networks of Criminal Activity
  • Name Matching in Law Enforcement Database
  • Discovering Investigation Clues through Mining Criminal Databases
  • Automated Filtering on Data Streaming for Intelligence Analysis
  • Personal Information Management for Intelligence Tasks
  • A Data Miner’s Approach to Country Corruption Analysis
  • Access Control, Infrastructure Protection and Privacy
  • Protecting Private Information in Online Social Networks
  • Protection of Database Security Via Collaborative Inference Detection
  • Suspect Vehicle Identification for Border Safety
  • Optimization Problems for Port-of-Entry Detection Systems
  • Modeling and Validation of Aviation Security
  • Surveillance and Emergency Response
  • Anomaly Detection in Moving Object
  • Intelligent Face Recognition
  • Video Analysis of Vehicles and Persons for Surveillance
  • Video-Based Deception Detection.