Intelligence and Security Informatics

Techniques and Applications

Editors:

ISBN: 978-3-540-69207-2 (Print) 978-3-540-69209-6 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Terrorism Informatics and Data Mining

    1. No Access

      Chapter

      Pages 1-15

      Assured Information Sharing: Technologies, Challenges and Directions

    2. No Access

      Chapter

      Pages 17-43

      Automating Event Extraction for the Security Domain

    3. No Access

      Chapter

      Pages 45-64

      Knowledge Discovery and Information Visualization for Terrorist Social Networks

    4. No Access

      Chapter

      Pages 65-78

      Understanding the Nexus of Terrorist Web Sites

    5. No Access

      Chapter

      Pages 79-96

      Multi-lingual Detection of Web Terrorist Content

    6. No Access

      Chapter

      Pages 97-119

      Modeling Anticipatory Event Transitions

    7. No Access

      Chapter

      Pages 121-134

      Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan

  3. Intelligence and Crime Analysis

    1. No Access

      Chapter

      Pages 135-150

      Identifying Interesting Networks of Criminal Activity

    2. No Access

      Chapter

      Pages 151-172

      Name Matching in Law Enforcement Database

    3. No Access

      Chapter

      Pages 173-198

      Discovering Investigation Clues through Mining Criminal Databases

    4. No Access

      Chapter

      Pages 199-213

      Automated Filtering on Data Streaming for Intelligence Analysis

    5. No Access

      Chapter

      Pages 215-226

      Personal Information Management for Intelligence Tasks

    6. No Access

      Chapter

      Pages 227-247

      A Data Miner’s Approach to Country Corruption Analysis

  4. Access Control, Infrastructure Protection and Privacy

    1. No Access

      Chapter

      Pages 249-273

      Protecting Private Information in Online Social Networks

    2. No Access

      Chapter

      Pages 275-303

      Protection of Database Security Via Collaborative Inference Detection

    3. No Access

      Chapter

      Pages 305-318

      Suspect Vehicle Identification for Border Safety

    4. No Access

      Chapter

      Pages 319-335

      Optimization Problems for Port-of-Entry Detection Systems

    5. No Access

      Chapter

      Pages 337-355

      Modeling and Validation of Aviation Security

  5. Surveillance and Emergency Response

    1. No Access

      Chapter

      Pages 357-381

      Anomaly Detection in Moving Object

    2. No Access

      Chapter

      Pages 383-406

      Intelligent Face Recognition

previous Page of 2