O'Reilly logo

Intelligent Systems for Security Informatics by Hui Wang, Xiaolong Zheng, Wenji Mao, Christopher C Yang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Note: Page numbers with “f” denote figures; “t” tables.

0-9

9/11 Commission Report, 107–108
∞-tolerance of privacy leakage, 56

A

Abstract State Machines (ASM), 87, 100
Decision Engine specifications, 101–103
decision management, 102f
evaluation, 103f
goal management, 101f
plan management, 102f
system domains, 101f
Abu Sayyaf Group, 137–138
Academic social networks, 52
Actionable mining and predictive analysis (AMPA) methodology, 194–195
Actions, 89
Active adversary attacks, 55
Add-word (AW) attack, 40
Ahmidan, Jamal, 143
Al Haramain Islamic Foundation (IBID), 137
Al Nur Honey Press Shops, 139–140
Al Qaeda, history and development, 128–132
Al Qaeda in the Islamic Maghreb (AQIM), 142–143
Al Qaeda terrorist financing
charities, 135–139
criminal ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required