Intelligence and Security Informatics Techniques and Applications /

Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of co...

Full description

Other Authors: Chen, Hsinchun., Yang, Christopher C., SpringerLink (Online service)
Format: eBook
Language: English
Published: Berlin : Springer-Verlag, 2008.
Berlin : 2008.
Physical Description: 1 online resource (xiii, 460 pages) : illustrations.
Series: Studies in computational intelligence ; v. 135.
Subjects:
LEADER 07408cam a2200961 a 4500
001 272298954
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cn|||||||||
008 081117s2008 gw a ob 001 0 eng d
019 |a 243827799  |a 495282679  |a 646044521  |a 756438548  |a 827771568  |a 985057810  |a 1005805402  |a 1050958477  |a 1067074589  |a 1162700024  |a 1204002978 
020 |a 9783540692096 
020 |a 3540692096 
020 |a 9783540692072 
020 |a 354069207X 
035 |a (OCoLC)272298954  |z (OCoLC)243827799  |z (OCoLC)495282679  |z (OCoLC)646044521  |z (OCoLC)756438548  |z (OCoLC)827771568  |z (OCoLC)985057810  |z (OCoLC)1005805402  |z (OCoLC)1050958477  |z (OCoLC)1067074589  |z (OCoLC)1162700024  |z (OCoLC)1204002978 
037 |a 978-3-540-69207-2  |b Springer  |n http://www.springerlink.com 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d DVP  |d OCLCQ  |d OH1  |d COO  |d CEF  |d NUI  |d UAB  |d OCLCQ  |d CSU  |d ISOBC  |d OCLCO  |d OCLCQ  |d A7U  |d OCLCQ  |d BEDGE  |d OCLCQ  |d OCLCF  |d YDXCP  |d IDEBK  |d W2U  |d OCLCQ  |d TXI  |d OCLCQ  |d VT2  |d Z5A  |d OCLCQ  |d ESU  |d OCLCA  |d OCLCQ  |d U3W  |d AU@  |d WYU  |d EBLCP  |d YOU  |d OCLCQ  |d LEAUB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d DCT  |d DKU  |d INARC  |d OCLCO  |d OCLCL 
049 |a COM6 
050 4 |a QA76.9.A25  |b I557 2008eb 
082 0 4 |a 006.3/3  |2 22 
245 0 0 |a Intelligence and Security Informatics :  |b Techniques and Applications /  |c [edited by] Hsinchun Chen, Christopher C. Yang. 
260 |a Berlin :  |b Springer-Verlag,  |c 2008. 
264 1 |a Berlin :  |b Springer-Verlag,  |c 2008. 
300 |a 1 online resource (xiii, 460 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file  |b PDF  |2 rda. 
490 1 |a Studies in computational intelligence,  |x 1860-949X ;  |v v. 135. 
504 |a Includes bibliographical references and indexes. 
588 0 |a Print version record. 
520 |a Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research. 
505 0 |a Terrorism Informatics and Data Mining -- Assured Information Sharing: Technologies, Challenges and Directions -- Automating Event Extraction for the Security Domain -- Knowledge Discovery and Information Visualization for Terrorist Social Networks -- Understanding the Nexus of Terrorist Web Sites -- Multi-lingual Detection of Web Terrorist Content -- Modeling Anticipatory Event Transitions -- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan -- Intelligence and Crime Analysis -- Identifying Interesting Networks of Criminal Activity -- Name Matching in Law Enforcement Database -- Discovering Investigation Clues through Mining Criminal Databases -- Automated Filtering on Data Streaming for Intelligence Analysis -- Personal Information Management for Intelligence Tasks -- A Data Miner's Approach to Country Corruption Analysis -- Access Control, Infrastructure Protection and Privacy -- Protecting Private Information in Online Social Networks -- Protection of Database Security Via Collaborative Inference Detection -- Suspect Vehicle Identification for Border Safety -- Optimization Problems for Port-of-Entry Detection Systems -- Modeling and Validation of Aviation Security -- Surveillance and Emergency Response -- Anomaly Detection in Moving Object -- Intelligent Face Recognition -- Video Analysis of Vehicles and Persons for Surveillance -- Video-Based Deception Detection. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Terrorism and mass media. 
650 0 |a Cyberterrorism  |x Prevention. 
650 0 |a Artificial intelligence. 
650 2 |a Computer Security. 
650 2 |a Artificial Intelligence. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Terrorisme et médias. 
650 6 |a Intelligence artificielle. 
650 6 |a Technologie de l'information. 
650 7 |a artificial intelligence.  |2 aat. 
650 7 |a information technology.  |2 aat. 
650 7 |a Ingénierie.  |2 eclas. 
650 7 |a Computer networks  |x Security measures.  |2 fast. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Cyberterrorism  |x Prevention.  |2 fast. 
650 7 |a Terrorism and mass media.  |2 fast. 
700 1 |a Chen, Hsinchun. 
700 1 |a Yang, Christopher C. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks. 
776 0 8 |i Print version:  |t Intelligence and Security Informatics.  |d Berlin : Springer-Verlag, 2008  |w (DLC) 2008925308. 
830 0 |a Studies in computational intelligence ;  |v v. 135.  |x 1860-949X. 
907 |a .b2951244x  |b multi  |c -  |d 100215  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i15020730x  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-540-69209-6  |3 SpringerLink  |z Click here for access