Yang / Chen | Intelligence and Security Informatics | Buch | 978-3-642-08870-4 | sack.de

Buch, Englisch, Band 135, 460 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 715 g

Reihe: Studies in Computational Intelligence

Yang / Chen

Intelligence and Security Informatics

Techniques and Applications

Buch, Englisch, Band 135, 460 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 715 g

Reihe: Studies in Computational Intelligence

ISBN: 978-3-642-08870-4
Verlag: Springer


The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response.
Yang / Chen Intelligence and Security Informatics jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Terrorism Informatics and Data Mining.- Assured Information Sharing: Technologies, Challenges and Directions.- Automating Event Extraction for the Security Domain.- Knowledge Discovery and Information Visualization for Terrorist Social Networks.- Understanding the Nexus of Terrorist Web Sites.- Multi-lingual Detection of Web Terrorist Content.- Modeling Anticipatory Event Transitions.- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan.- Intelligence and Crime Analysis.- Identifying Interesting Networks of Criminal Activity.- Name Matching in Law Enforcement Database.- Discovering Investigation Clues through Mining Criminal Databases.- Automated Filtering on Data Streaming for Intelligence Analysis.- Personal Information Management for Intelligence Tasks.- A Data Miner’s Approach to Country Corruption Analysis.- Access Control, Infrastructure Protection and Privacy.- Protecting Private Information in Online Social Networks.- Protection of Database Security Via Collaborative Inference Detection.- Suspect Vehicle Identification for Border Safety.- Optimization Problems for Port-of-Entry Detection Systems.- Modeling and Validation of Aviation Security.- Surveillance and Emergency Response.- Anomaly Detection in Moving Object.- Intelligent Face Recognition.- Video Analysis of Vehicles and Persons for Surveillance.- Video-Based Deception Detection.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.