Narrow your search
Listing 1 - 10 of 26 << page
of 3
>>
Sort by

Digital
Intelligent systems for security informatics
Author:
ISBN: 9780124059023 0124059023 Year: 2013 Publisher: Waltham, MA Academic Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI).

Intelligence and security informatics : Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings
Authors: ---
ISBN: 9783540715481 3540715487 9786610951734 1280951737 3540715495 Year: 2007 Publisher: Berlin, Germany ; New York, New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. The annual IEEE International Conference series on ISI was started in 2003 and the first four meetings were held in the United States. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining, with over 100 contributors and participants from all over the world. These past ISI conferences have brought together academic researchers, law enforcement and intelligence experts, information technology consultants, and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. We continued this stream of ISI conferences by organizing the 2007 Pacific Asia Workshop on ISI (PAISI 2007) to especially provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. PAISI 2007 was hosted by the Chinese Academy of Sciences, the University of Arizona, and the Chinese University of Hong Kong.

Keywords

Expert systems (Computer science) --- Data mining --- Computer security --- Electronic surveillance --- National security --- Congresses. --- Computer security -- Pacific Area -- Congresses. --- Data mining -- Pacific Area -- Congresses. --- Electronic surveillance -- Pacific Area -- Congresses. --- Expert systems (Computer science) -- Pacific Area -- Congresses. --- National security -- Pacific Area -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Knowledge-based systems (Computer science) --- Systems, Expert (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Information storage and retrieval. --- Computers and civilization. --- Computers. --- Law and legislation. --- Computer Science. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Information Storage and Retrieval. --- Computer Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Distributed processing --- Remote sensing --- Database searching --- Artificial intelligence --- Soft computing --- Data protection --- Security systems --- Hacking --- Information storage and retrieva. --- Cryptology. --- Law and legislation --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Intelligence and security informatics : techniques and applications
Authors: ---
ISBN: 9783540692072 354069207X 3540692096 Year: 2008 Publisher: Berlin, Germany : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.

Keywords

Computer security. --- Computer networks --- Terrorism and mass media. --- Cyberterrorism --- Sécurité informatique --- Réseaux d'ordinateurs --- Terrorisme et médias --- Cyberterrorisme --- Security measures. --- Prevention. --- Sécurité --- Mesures --- Prévention --- Expert systems (Computer science) --- Data mining --- Computer security --- Terrorism --- Civil Engineering --- Applied Mathematics --- Computer Science --- Civil & Environmental Engineering --- Engineering & Applied Sciences --- Prevention --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Knowledge-based systems (Computer science) --- Systems, Expert (Computer science) --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Information technology. --- Business --- Data encryption (Computer science). --- Artificial intelligence. --- E-commerce. --- Applied mathematics. --- Engineering mathematics. --- Appl.Mathematics/Computational Methods of Engineering. --- Data Encryption. --- Artificial Intelligence (incl. Robotics). --- e-Commerce/e-business. --- IT in Business. --- Data processing. --- Engineering --- Engineering analysis --- Mathematical analysis --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- IT (Information technology) --- Technology --- Telematics --- Knowledge management --- Construction --- Industrial arts --- Mathematics --- Mathematical and Computational Engineering. --- Cryptology. --- Artificial Intelligence. --- Business—Data processing. --- Data mining. --- Data protection --- Security systems --- Hacking --- Database searching --- Artificial intelligence --- Soft computing --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism


Book
Intelligent systems for security informatics
Authors: ---
ISBN: 0124059023 1283993953 0124047025 9780124059023 9780124047020 Year: 2013 Publisher: Oxford : Academic Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr


Book
ICEC 2014 : the 16th International Conference on Electronic Commerce : Philadelphia, PA, USA, August 5-6, 2014
Authors: ---
ISBN: 1450326188 Year: 2014 Publisher: [Place of publication not identified] ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Intelligence and Security Informatics : Techniques and Applications
Authors: ---
ISBN: 9783540692096 Year: 2008 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Book
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics 2012 : Beijing, China : ISI-KDD 2012
Authors: --- --- --- ---
ISBN: 145031550X Year: 2012 Publisher: [Place of publication not identified] ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Security Informatics
Authors: --- --- ---
ISBN: 1441913246 9786612832574 1441913254 1282832573 Year: 2010 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.

Keywords

Business enterprises --Computer networks --Security measures -- Congresses. --- Computer security -- Congresses. --- Data mining -- Congresses. --- Electronic surveillance -- Congresses. --- Expert systems (Computer science) -- Congresses. --- National security -- Congresses. --- Computer security --- Data protection --- Computer Science --- Engineering & Applied Sciences --- Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Operations research. --- Decision making. --- Information technology. --- Business --- Computer organization. --- Data mining. --- Artificial intelligence. --- Computer Science. --- Systems and Data Security. --- IT in Business. --- Data Mining and Knowledge Discovery. --- Operation Research/Decision Theory. --- Computer Systems Organization and Communication Networks. --- Artificial Intelligence (incl. Robotics). --- Data processing. --- Security systems --- Hacking --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Organization, Computer --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Choice (Psychology) --- Problem solving --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- Informatics --- Science --- Decision making --- Computer network architectures. --- Operations Research/Decision Theory. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Business—Data processing.


Book
Intelligence and Security Informatics : Techniques and Applications
Authors: --- ---
ISBN: 9783540692096 Year: 2008 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research. The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.


Digital
Security Informatics
Authors: --- --- ---
ISBN: 9781441913258 9781441913357 9781441913241 Year: 2010 Publisher: New York, NY Springer US

Loading...
Export citation

Choose an application

Bookmark

Abstract

Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.

Listing 1 - 10 of 26 << page
of 3
>>
Sort by