Book description
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.
The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years.
- Pulls together key information on ensuring national security around the world
- The latest research on this subject is concisely presented within the book, with several figures to support the text.
- Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
Table of contents
- Cover image
- Title page
- Table of Contents
- Series Page
- Copyright
- Preface
- Chapter 1. Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
- Chapter 2. Proactive Cyber Defense
- Chapter 3. Privacy-Preserving Social Network Integration, Analysis, and Mining
- Chapter 4. A Digraph Model for Risk Identification and Management in SCADA Systems
- Chapter 5. High-Level Architecture and Design of a Decision Engine for Marine Safety and Security
- Chapter 6. Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach
-
Chapter 7. Al Qaeda Terrorist Financing
- 7.1 Importance of Cutting Terrorist Financing
- 7.2 Description of Al Qaeda’s Financial Network
- 7.3 History and Development of Al Qaeda and its Financial Network
- 7.4 Organizational Structure: Control Over Finances Within Al Qaeda
- 7.5 Al Qaeda’s Portfolio and Sources of “Revenues”
- 7.6 Methods of Transferring and Storing Funds
- References
-
Chapter 8. Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis
- 8.1 Introduction
- 8.2 Relevant Works
- 8.3 Initial Network Construction
- 8.4 Network Refinement Based on Interaction Relation Hypothesis
- 8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents
- 8.6 Analysis and Verification
- 8.7 Conclusions
- Acknowledgments
- References
- Chapter 9. Incorporating Data and Methodologies for Knowledge Discovery for Crime
- Index
Product information
- Title: Intelligent Systems for Security Informatics
- Author(s):
- Release date: January 2013
- Publisher(s): Academic Press
- ISBN: 9780124059023
You might also like
book
Higher Order Basis Based Integral Equation Solver (HOBBIES)
The latest in parallel EM solutions with both in-core and out-of-core solvers The solution of complex …
book
Microbiorobotics
Microbiorobotics is a new engineering discipline that inherently involves a multidisciplinary approach (mechanical engineering, cellular biology, …
book
Parallel Programming with OpenACC
Parallel Programming with OpenACC is a modern, practical guide to implementing dependable computing systems. The book …
book
How To Talk To Absolutely Anyone, 2nd Edition
Talk to anyone, anytime, about anything — with confidence. How to Talk to Absolutely Anyone is …