Advances in intelligence and security informatics
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. Traditionally, Intelligence and Security Informatics (ISI...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Elsevier/AP : Zhejiang University Press
c2012.
|
Edición: | 1st ed |
Colección: | Intelligent systems series.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628858606719 |
Tabla de Contenidos:
- Front cover; Half title page; Zhejiang University Press Intelligent Systems Series; Chief Editor; Editorial Board Members; Advances in Intelligence and Security Informatics; Copyright page; Table of Contents; Preface; Acknowledgements; Chapter 1 Intelligence and Security Informatics; 1.1 Research Methodology and Frameworks for ISI; 1.2 The ACP Approach; 1.2.1 Modeling with Artificial Societies; 1.2.2 Analysis with Computational Experiments; 1.2.3 Control Through Parallel Execution; 1.2.4 Foundations in Philosophy and Physics; 1.3 Outline of Chapters; References
- Chapter 2 Agent Modeling of Terrorist Organization Behavior2.1 Modeling Organizational Behavior; 2.2 Action Extraction from the Web; 2.2.1 Action Data Collection; 2.2.2 Raw Action Extraction; 2.2.3 Action Elimination; 2.2.4 Action Refinement; 2.3 Extracting Causal Knowledge from the Web; 2.4 Construction of Action Hierarchy; 2.5 Designing Causal Scenarios; 2.6 Case Study on Terrorist Organization; 2.7 Conclusion; References; Chapter 3 Security Story Generation for Computational Experiments; 3.1 Story Generation Systems; 3.2 System Workflow and Narrative Structure
- 3.3 Story Extraction Approach3.3.1 Text Processing with Domain Knowledge; 3.3.2 Event Detection and Event Element Extraction; 3.3.3 Design and Organization of Patterns; 3.3.4 Event Element Standardization; Number Conversion; Time Standardization; Location Standardization; 3.3.5 Evaluation of Event Relations; 3.4 Experiment; 3.5 Conclusion; References; Chapter 4 Forecasting Group Behavior via Probabilistic Plan Inference; 4.1 Review of Plan-Based Inference; 4.2 Probabilistic Plan Representation; 4.3 Probabilistic Reasoning Approach; 4.3.1 Notation; 4.3.2 Computation; Probability of States
- Probability of Action ExecutionOutcome Probability and Expected Utility of Actions; Outcome Probability of Plans and Expected Plan Utility; 4.4 Case Study in Security Informatics; 4.4.1 Construction of Plan Library; 4.4.2 The Test Set; 4.4.3 Experimental Results; 4.5 Conclusion; References; Chapter 5 Forecasting Complex Group Behavior via Multiple Plan Recognition; 5.1 Multiple Plan Recognition for Behavior Prediction; 5.2 The MPR Problem Definition; 5.3 The Proposed MPR Approach; 5.3.1 Constructing the Explanation Graph; Observed Actions; Observed States
- 5.3.2 Computing Probability of an Explanation5.3.3 Finding the Best Explanation; 5.3.4 Algorithm and Complexity Analysis; Algorithm (Plan Library PL, Observation Set O); Complexity; 5.3.5 Discussion; 5.4 Case Study in Security Informatics; 5.4.1 Experimental Design; 5.4.2 Results; 5.5 Conclusion; References; Chapter 6 Social Computing in ISI; 6.1 Social Computing; 6.1.1 Theoretical and Infrastructure Underpinnings; 6.1.2 Major Application Areas; 6.2 A Social Computing-Based ISI Research Framework; 6.2.1 Modeling with Artificial Societies; 6.2.2 Analysis with Computational Experiments
- 6.2.3 Control and Management Through Parallel Execution