Intelligence and Security Informatics Techniques and Applications /

Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of co...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Chen, Hsinchun. (Editor, http://id.loc.gov/vocabulary/relators/edt), Yang, Christopher C. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edition:1st ed. 2008.
Series:Studies in Computational Intelligence, 135
Subjects:
Online Access:https://doi.org/10.1007/978-3-540-69209-6
Table of Contents:
  • Terrorism Informatics and Data Mining
  • Assured Information Sharing: Technologies, Challenges and Directions
  • Automating Event Extraction for the Security Domain
  • Knowledge Discovery and Information Visualization for Terrorist Social Networks
  • Understanding the Nexus of Terrorist Web Sites
  • Multi-lingual Detection of Web Terrorist Content
  • Modeling Anticipatory Event Transitions
  • Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan
  • Intelligence and Crime Analysis
  • Identifying Interesting Networks of Criminal Activity
  • Name Matching in Law Enforcement Database
  • Discovering Investigation Clues through Mining Criminal Databases
  • Automated Filtering on Data Streaming for Intelligence Analysis
  • Personal Information Management for Intelligence Tasks
  • A Data Miner’s Approach to Country Corruption Analysis
  • Access Control, Infrastructure Protection and Privacy
  • Protecting Private Information in Online Social Networks
  • Protection of Database Security Via Collaborative Inference Detection
  • Suspect Vehicle Identification for Border Safety
  • Optimization Problems for Port-of-Entry Detection Systems
  • Modeling and Validation of Aviation Security
  • Surveillance and Emergency Response
  • Anomaly Detection in Moving Object
  • Intelligent Face Recognition
  • Video Analysis of Vehicles and Persons for Surveillance
  • Video-Based Deception Detection.