Listing 1 - 10 of 24 | << page >> |
Sort by
|
Choose an application
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).
Choose an application
Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong.
Expert systems (Computer science) --- Data mining --- Computer security --- Electronic surveillance --- National security --- Congresses. --- Computer security -- Pacific Area -- Congresses. --- Data mining -- Pacific Area -- Congresses. --- Electronic surveillance -- Pacific Area -- Congresses. --- Expert systems (Computer science) -- Pacific Area -- Congresses. --- National security -- Pacific Area -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Knowledge-based systems (Computer science) --- Systems, Expert (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computer Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Distributed processing --- Remote sensing --- Database searching --- Artificial intelligence --- Soft computing --- Data protection --- Security systems --- Hacking --- Information storage and retrieva. --- Cryptology. --- Law and legislation --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.
Computer security. --- Computer networks --- Terrorism and mass media. --- Cyberterrorism --- Sécurité informatique --- Réseaux d'ordinateurs --- Terrorisme et médias --- Cyberterrorisme --- Security measures. --- Prevention. --- Sécurité --- Mesures --- Prévention --- Expert systems (Computer science) --- Data mining --- Computer security --- Terrorism --- Civil Engineering --- Applied Mathematics --- Computer Science --- Civil & Environmental Engineering --- Engineering & Applied Sciences --- Prevention --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Knowledge-based systems (Computer science) --- Systems, Expert (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Information technology. --- Business --- Data encryption (Computer science). --- Artificial intelligence. --- E-commerce. --- Applied mathematics. --- Engineering mathematics. --- Appl.Mathematics/Computational Methods of Engineering. --- Data Encryption. --- Artificial Intelligence (incl. Robotics). --- e-Commerce/e-business. --- IT in Business. --- Data processing. --- Engineering --- Engineering analysis --- Mathematical analysis --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- IT (Information technology) --- Technology --- Telematics --- Knowledge management --- Construction --- Industrial arts --- Mathematics --- Mathematical and Computational Engineering. --- Cryptology. --- Artificial Intelligence. --- Business—Data processing. --- Data mining. --- Data protection --- Security systems --- Hacking --- Database searching --- Artificial intelligence --- Soft computing --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism
Choose an application
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr
Artificial intelligence -- Congresses. --- Computer networks -- Congresses. --- Data mining -- Congresses. --- Computer security --- Artificial intelligence --- Computer networks --- Information technology --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Computer security. --- National security. --- Information Technology --- General and Others --- National security --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Government policy --- Protection --- Artificial intelligence. --- Security measures.
Choose an application
Choose an application
Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.
Engineering sciences. Technology --- Distribution strategy --- Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- analyse (wiskunde) --- bedrijfseconomie --- DES (data encryption standard) --- e-commerce --- KI (kunstmatige intelligentie) --- informatica management --- ingenieurswetenschappen --- robots --- AI (artificiële intelligentie)
Choose an application
Choose an application
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.
Expert systems (Computer science) --- Computer security --- National security --- Computer crimes --- Systèmes experts (Informatique) --- Sécurité informatique --- Sécurité nationale --- Criminalité informatique --- Congresses. --- Investigation --- Congrès --- Enquêtes --- Computer Science --- Engineering & Applied Sciences --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Knowledge-based systems (Computer science) --- Systems, Expert (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Data mining. --- Computers and civilization. --- Applied mathematics. --- Engineering mathematics. --- Computer Science. --- Data Encryption. --- Applications of Mathematics. --- Information Systems Applications (incl. Internet). --- Data Mining and Knowledge Discovery. --- Computer Communication Networks. --- Computers and Society. --- Engineering --- Engineering analysis --- Mathematical analysis --- Civilization and computers --- Civilization --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Mathematics --- Distributed processing --- Crime --- Privacy, Right of --- Data protection --- Security systems --- Hacking --- Artificial intelligence --- Soft computing --- Mathematics. --- Cryptology. --- Math --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.
Engineering sciences. Technology --- Distribution strategy --- Computer science --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- analyse (wiskunde) --- bedrijfseconomie --- DES (data encryption standard) --- e-commerce --- KI (kunstmatige intelligentie) --- informatica management --- ingenieurswetenschappen --- robots
Choose an application
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
Operational research. Game theory --- Mathematical statistics --- Business policy --- Planning (firm) --- Business management --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- datamining --- besluitvorming --- computers --- informatica --- mathematische modellen --- computerbesturingssystemen --- organisatiecultuur --- speltheorie --- informatietechnologie --- econometrie --- computerbeveiliging --- KI (kunstmatige intelligentie) --- operationeel onderzoek --- OS (operating system) --- data acquisition --- AI (artificiële intelligentie)
Listing 1 - 10 of 24 | << page >> |
Sort by
|