Intelligent systems for security informatics

The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security...

Descripción completa

Detalles Bibliográficos
Autor principal: Yang, Christopher (-)
Otros Autores: Yang, Christopher C.
Formato: Libro electrónico
Idioma:Inglés
Publicado: Oxford : Academic Press 2013.
Oxford : [Hangzhou, China] : 2013.
Edición:1st ed
Colección:Intelligent systems series
Intelligent systems series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628574006719
Tabla de Contenidos:
  • Front Cover; Intelligent Systems Series; Intelligent Systems for Security Informatics; Copyright; Contents; Preface; Chapter 1 - Revealing the Hidden World of the Dark Web: Social Media Forums and Videos1; 1.1 Introduction; 1.2 The Dark Web Forum Portal; 1.3 The Video Portal; 1.4 Conclusion and Future Directions; Acknowledgments; References; Chapter 2 - Proactive Cyber Defense; 2.1 Introduction; 2.2 Proactive Filters; 2.3 Early Warning; 2.4 Concluding Remarks; Acknowledgments; References; Chapter 3 - Privacy-Preserving Social Network Integration, Analysis, and Mining
  • 3.1 Social Network Analysis and Mining3.2 Privacy Preservation; 3.3 Information Integration and Privacy Preservation for SNAM; 3.4 Conclusion; References; Chapter 4 - A Digraph Model for Risk Identification and Management in SCADA Systems; 4.1 Introduction; 4.2 Background; 4.3 A Digraph Model of SCADA Systems; 4.4 Conclusions; References; Chapter 5 - High-Level Architecture and Design of a Decision Engine for Marine Safety and Security1; 5.1 Introduction; 5.2 Background; 5.3 Conceptual Design; 5.4 Formal Representation; 5.5 Application; 5.6 Conclusions and Future Work; Acknowledgments
  • ReferencesChapter 6 - Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach; 6.1 Introduction; 6.2 Related Work; 6.3 A Collective Identity Resolution Approach; 6.4 Experiments; 6.5 Concluding Remarks; References; Chapter 7 - Al Qaeda Terrorist Financing; 7.1 Importance of Cutting Terrorist Financing; 7.2 Description of Al Qaeda's Financial Network; 7.3 History and Development of Al Qaeda and its Financial Network; 7.4 Organizational Structure: Control Over Finances Within Al Qaeda; 7.5 Al Qaeda's Portfolio and Sources of "Revenues"
  • 7.6 Methods of Transferring and Storing FundsReferences; Chapter 8 - Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis; 8.1 Introduction; 8.2 Relevant Works; 8.3 Initial Network Construction; 8.4 Network Refinement Based on Interaction Relation Hypothesis; 8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents; 8.6 Analysis and Verification; 8.7 Conclusions; Acknowledgments; References; Chapter 9 - Incorporating Data and Methodologies for Knowledge Discovery for Crime; 9.1 Introduction
  • 9.2 Steps Involved in Crime Investigation9.3 Data Sources for Crime Data Mining and Investigation; 9.4 The Four Types of Knowledge Discovery; 9.5 Knowledge Discovery Methodologies for Crime Data; 9.6 Methodologies Applied to Knowledge Discovery Types; 9.7 Conclusion; References; Index