Atnaujinkite slapukų nuostatas

Intelligent Systems for Security Informatics [Kietas viršelis]

(Chinese Academy of Sciences), (Chinese Academy of Sciences), (National University of Defense Technology), (Drexel University)
  • Formatas: Hardback, 250 pages, aukštis x plotis: 235x191 mm, weight: 760 g
  • Išleidimo metai: 15-Feb-2013
  • Leidėjas: Academic Press Inc
  • ISBN-10: 0124047025
  • ISBN-13: 9780124047020
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 250 pages, aukštis x plotis: 235x191 mm, weight: 760 g
  • Išleidimo metai: 15-Feb-2013
  • Leidėjas: Academic Press Inc
  • ISBN-10: 0124047025
  • ISBN-13: 9780124047020
Kitos knygos pagal šią temą:

The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.

The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years.

  • Pulls together key information on ensuring national security around the world
  • The latest research on this subject is concisely presented within the book, with several figures to support the text.
  • Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)

Recenzijos

"this book represents a well-written introduction to the subject of intelligent systems for security informatics. The chapters have adequate references and the index is satisfactory. The treatment of topics, the typesetting, and the binding of the hardcover version of the book are praiseworthy. I strongly recommend this book for all those interested in ISI." --ComputingReviews.com, February 6, 2014

"Yang, Mao, Zheng, and Wang survey the most active areas of research in the overlap between intelligence and security. They consider such aspects as social media forums and videos, proactive cyber defense, a high-level architecture and design of a decision engine for marine safety and security, criminal identity resolution using personal and social identity attributes, and a study of covert networks of terrorists" --Reference and Research Book News, October 2013

Daugiau informacijos

The newest title in the Intelligent Systems series; covering national security and defense.
Preface ix
Chapter 1 Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
1(28)
1.1 Introduction
2(1)
1.2 The Dark Web Forum Portal
3(10)
1.3 The Video Portal
13(12)
1.4 Conclusion and Future Directions
25(4)
Acknowledgments
26(1)
References
27(2)
Chapter 2 Proactive Cyber Defense
29(22)
2.1 Introduction
29(2)
2.2 Proactive Filters
31(9)
2.3 Early Warning
40(8)
2.4 Concluding Remarks
48(3)
Acknowledgments
49(1)
References
49(2)
Chapter 3 Privacy-Preserving Social Network Integration, Analysis, and Mining
51(18)
3.1 Social Network Analysis and Mining
51(1)
3.2 Privacy Preservation
52(2)
3.3 Information Integration and Privacy Preservation for SNAM
54(10)
3.4 Conclusion
64(5)
References
64(5)
Chapter 4 A Digraph Model for Risk Identification and Management in SCADA Systems
69(16)
4.1 Introduction
69(1)
4.2 Background
70(1)
4.3 A Digraph Model of SCADA Systems
71(11)
4.4 Conclusions
82(3)
References
83(2)
Chapter 5 High-Level Architecture and Design of a Decision Engine for Marine Safety and Security
85(22)
5.1 Introduction
86(1)
5.2 Background
87(4)
5.3 Conceptual Design
91(9)
5.4 Formal Representation
100(3)
5.5 Application
103(1)
5.6 Conclusions and Future Work
103(4)
Acknowledgments
104(1)
References
104(3)
Chapter 6 Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach
107(18)
6.1 Introduction
107(2)
6.2 Related Work
109(4)
6.3 A Collective Identity Resolution Approach
113(6)
6.4 Experiments
119(4)
6.5 Concluding Remarks
123(2)
References
123(2)
Chapter 7 Al Qaeda Terrorist Financing
125(30)
7.1 Importance of Cutting Terrorist Financing
125(1)
7.2 Description of Al Qaeda's Financial Network
126(2)
7.3 History and Development of Al Qaeda and its Financial Network
128(4)
7.4 Organizational Structure: Control Over Finances Within Al Qaeda
132(3)
7.5 Al Qaeda's Portfolio and Sources of "Revenues"
135(8)
7.6 Methods of Transferring and Storing Funds
143(12)
References
150(5)
Chapter 8 Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis
155(26)
8.1 Introduction
156(1)
8.2 Relevant Works
157(1)
8.3 Initial Network Construction
158(6)
8.4 Network Refinement Based on Interaction Relation Hypothesis
164(7)
8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents
171(3)
8.6 Analysis and Verification
174(4)
8.7 Conclusions
178(3)
Acknowledgments
179(1)
References
179(2)
Chapter 9 Incorporating Data and Methodologies for Knowledge Discovery for Crime
181(18)
9.1 Introduction
182(1)
9.2 Steps Involved in Crime Investigation
182(1)
9.3 Data Sources for Crime Data Mining and Investigation
183(3)
9.4 The Four Types of Knowledge Discovery
186(6)
9.5 Knowledge Discovery Methodologies for Crime Data
192(4)
9.6 Methodologies Applied to Knowledge Discovery Types
196(1)
9.7 Conclusion
197(2)
References
197(2)
Index 199