TY - BOOK ID - 5454138 TI - Intelligence and security informatics : techniques and applications AU - Yang, Christopher C. AU - Chen, Hsinchun PY - 2008 SN - 9783540692072 354069207X 3540692096 PB - Berlin, Germany : Springer, DB - UniCat KW - Computer security. KW - Computer networks KW - Terrorism and mass media. KW - Cyberterrorism KW - Sécurité informatique KW - Réseaux d'ordinateurs KW - Terrorisme et médias KW - Cyberterrorisme KW - Security measures. KW - Prevention. KW - Sécurité KW - Mesures KW - Prévention KW - Expert systems (Computer science) KW - Data mining KW - Computer security KW - Terrorism KW - Civil Engineering KW - Applied Mathematics KW - Computer Science KW - Civil & Environmental Engineering KW - Engineering & Applied Sciences KW - Prevention KW - Acts of terrorism KW - Attacks, Terrorist KW - Global terrorism KW - International terrorism KW - Political terrorism KW - Terror attacks KW - Terrorist acts KW - Terrorist attacks KW - World terrorism KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Security of computer systems KW - Algorithmic knowledge discovery KW - Factual data analysis KW - KDD (Information retrieval) KW - Knowledge discovery in data KW - Knowledge discovery in databases KW - Mining, Data KW - Knowledge-based systems (Computer science) KW - Systems, Expert (Computer science) KW - Security measures KW - Protection of computer systems KW - Protection KW - Engineering. KW - Information technology. KW - Business KW - Data encryption (Computer science). KW - Artificial intelligence. KW - E-commerce. KW - Applied mathematics. KW - Engineering mathematics. KW - Appl.Mathematics/Computational Methods of Engineering. KW - Data Encryption. KW - Artificial Intelligence (incl. Robotics). KW - e-Commerce/e-business. KW - IT in Business. KW - Data processing. KW - Engineering KW - Engineering analysis KW - Mathematical analysis KW - Cybercommerce KW - E-business KW - E-commerce KW - E-tailing KW - eBusiness KW - eCommerce KW - Electronic business KW - Internet commerce KW - Internet retailing KW - Online commerce KW - Web retailing KW - Commerce KW - Information superhighway KW - AI (Artificial intelligence) KW - Artificial thinking KW - Electronic brains KW - Intellectronics KW - Intelligence, Artificial KW - Intelligent machines KW - Machine intelligence KW - Thinking, Artificial KW - Bionics KW - Cognitive science KW - Digital computer simulation KW - Electronic data processing KW - Logic machines KW - Machine theory KW - Self-organizing systems KW - Simulation methods KW - Fifth generation computers KW - Neural computers KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Cryptography KW - IT (Information technology) KW - Technology KW - Telematics KW - Knowledge management KW - Construction KW - Industrial arts KW - Mathematics KW - Mathematical and Computational Engineering. KW - Cryptology. KW - Artificial Intelligence. KW - Business—Data processing. KW - Data mining. KW - Data protection KW - Security systems KW - Hacking KW - Database searching KW - Artificial intelligence KW - Soft computing KW - Anti-terrorism KW - Antiterrorism KW - Counter-terrorism KW - Counterterrorism UR - https://www.unicat.be/uniCat?func=search&query=sysid:5454138 AB - Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research. ER -