Skip to main content
  • Book
  • © 2008

Intelligence and Security Informatics

Techniques and Applications

  • Latest research on intelligence and security informatics

Part of the book series: Studies in Computational Intelligence (SCI, volume 135)

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 chapters)

  1. Front Matter

  2. Terrorism Informatics and Data Mining

    1. Automating Event Extraction for the Security Domain

      • Clive Best, Jakub Piskorski, Bruno Pouliquen, Ralf Steinberger, Hristo Tanev
      Pages 17-43
    2. Understanding the Nexus of Terrorist Web Sites

      • Jennifer Xu, Hsinchun Chen
      Pages 65-78
    3. Multi-lingual Detection of Web Terrorist Content

      • Mark Last, Alex Markov, Abraham Kandel
      Pages 79-96
    4. Modeling Anticipatory Event Transitions

      • Qi He, Kuiyu Chang, Ee-Peng Lim
      Pages 97-119
    5. Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan

      • Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen
      Pages 121-134
  3. Intelligence and Crime Analysis

    1. Name Matching in Law Enforcement Database

      • Olcay Kursun, Michael Georgiopoulos, Kenneth Reynolds
      Pages 151-172
    2. Automated Filtering on Data Streaming for Intelligence Analysis

      • Yiming Ma, Dawit Yimam Seid, Sharad Mehrotra
      Pages 199-213
    3. A Data Miner’s Approach to Country Corruption Analysis

      • Johan Huysmans, Bart Baesens, Jan Vanthienen
      Pages 227-247
  4. Access Control, Infrastructure Protection and Privacy

    1. Protecting Private Information in Online Social Networks

      • Jianming He, Wesley W. Chu
      Pages 249-273
    2. Suspect Vehicle Identification for Border Safety

      • Siddharth Kaza, Hsinchun Chen
      Pages 305-318
    3. Optimization Problems for Port-of-Entry Detection Systems

      • Endre Boros, Elsayed Elsayed, Paul Kantor, Fred Roberts, Minge Xie
      Pages 319-335
    4. Modeling and Validation of Aviation Security

      • Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
      Pages 337-355
  5. Surveillance and Emergency Response

    1. Anomaly Detection in Moving Object

      • Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonzalez
      Pages 357-381

About this book

The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response.

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access