default search action
Intelligence and Security Informatics 2008
- Hsinchun Chen, Christopher C. Yang:
Intelligence and Security Informatics, Techniques and Applications. Studies in Computational Intelligence 135, Springer 2008, ISBN 978-3-540-69207-2
Terrorism Informatics and Data Mining
- Bhavani Thuraisingham:
Assured Information Sharing: Technologies, Challenges and Directions. 1-15 - Clive Best, Jakub Piskorski, Bruno Pouliquen, Ralf Steinberger, Hristo Tanev:
Automating Event Extraction for the Security Domain. 17-43 - Christopher C. Yang:
Knowledge Discovery and Information Visualization for Terrorist Social Networks. 45-64 - Jennifer Jie Xu, Hsinchun Chen:
Understanding the Nexus of Terrorist Web Sites. 65-78 - Mark Last, Alex Markov, Abraham Kandel:
Multi-lingual Detection of Web Terrorist Content. 79-96 - Qi He, Kuiyu Chang, Ee-Peng Lim:
Modeling Anticipatory Event Transitions. 97-119 - Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen:
Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan. 121-134
Intelligence and Crime Analysis
- Byron Marshall:
Identifying Interesting Networks of Criminal Activity. 135-150 - Olcay Kursun, Michael Georgiopoulos, Kenneth M. Reynolds:
Name Matching in Law Enforcement Database. 151-172 - Patrick S. Chen:
Discovering Investigation Clues through Mining Criminal Databases. 173-198 - Yiming Ma, Dawit Yimam Seid, Sharad Mehrotra:
Automated Filtering on Data Streaming for Intelligence Analysis. 199-213 - Antonio Badia:
Personal Information Management for Intelligence Tasks. 215-226 - Johan Huysmans, Bart Baesens, Jan Vanthienen:
A Data Miner's Approach to Country Corruption Analysis. 227-247
Access Control, Infrastructure Protection and Privacy
- Jianming He, Wesley W. Chu:
Protecting Private Information in Online Social Networks. 249-273 - Yu Chen, Wesley W. Chu:
Protection of Database Security Via Collaborative Inference Detection. 275-303 - Siddharth Kaza, Hsinchun Chen:
Suspect Vehicle Identification for Border Safety. 305-318 - Endre Boros, Elsayed A. Elsayed, Paul B. Kantor, Fred S. Roberts, Minge Xie:
Optimization Problems for Port-of-Entry Detection Systems. 319-335 - Uwe Glässer, Sarah Rastkar, Mona Vajihollahi:
Modeling and Validation of Aviation Security. 337-355
Surveillance and Emergency Response
- Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonzalez:
Anomaly Detection in Moving Object. 357-381 - Adnan Khashman:
Intelligent Face Recognition. 383-406 - Sangho Park, Mohan M. Trivedi:
Video Analysis of Vehicles and Persons for Surveillance. 407-424 - Matthew L. Jensen, Thomas O. Meservy, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Video-Based Deception Detection. 425-441
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.