
Intelligent Systems for Security Informatics
- 1st Edition - January 28, 2013
- Imprint: Academic Press
- Authors: Christopher C Yang, Wenji Mao, Xiaolong Zheng, Hui Wang
- Language: English
- Paperback ISBN:9 7 8 - 0 - 3 2 3 - 2 8 2 5 5 - 0
- Hardback ISBN:9 7 8 - 0 - 1 2 - 4 0 4 7 0 2 - 0
- eBook ISBN:9 7 8 - 0 - 1 2 - 4 0 5 9 0 2 - 3
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, de… Read more
Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteThe Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.
The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years.
- Pulls together key information on ensuring national security around the world
- The latest research on this subject is concisely presented within the book, with several figures to support the text.
- Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
Electrical and Electronic Engineers; Mechanical Engineers; Computer Engineers; Intelligent Systems specialists.
Series Page
Preface
Chapter 1. Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
1.1 Introduction
1.2 The Dark Web Forum Portal
1.3 The Video Portal
1.4 Conclusion and Future Directions
Acknowledgments
References
Chapter 2. Proactive Cyber Defense
2.1 Introduction
2.2 Proactive Filters
2.3 Early Warning
2.4 Concluding Remarks
Acknowledgments
References
Chapter 3. Privacy-Preserving Social Network Integration, Analysis, and Mining
3.1 Social Network Analysis and Mining
3.2 Privacy Preservation
3.3 Information Integration and Privacy Preservation for SNAM
3.4 Conclusion
References
Chapter 4. A Digraph Model for Risk Identification and Management in SCADA Systems
4.1 Introduction
4.2 Background
4.3 A Digraph Model of SCADA Systems
4.4 Conclusions
References
Chapter 5. High-Level Architecture and Design of a Decision Engine for Marine Safety and Security
5.1 Introduction
5.2 Background
5.3 Conceptual Design
5.4 Formal Representation
5.5 Application
5.6 Conclusions and Future Work
Acknowledgments
References
Chapter 6. Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach
6.1 Introduction
6.2 Related Work
6.3 A Collective Identity Resolution Approach
6.4 Experiments
6.5 Concluding Remarks
References
Chapter 7. Al Qaeda Terrorist Financing
7.1 Importance of Cutting Terrorist Financing
7.2 Description of Al Qaeda’s Financial Network
7.3 History and Development of Al Qaeda and its Financial Network
7.4 Organizational Structure: Control Over Finances Within Al Qaeda
7.5 Al Qaeda’s Portfolio and Sources of “Revenues”
7.6 Methods of Transferring and Storing Funds
References
Chapter 8. Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis
8.1 Introduction
8.2 Relevant Works
8.3 Initial Network Construction
8.4 Network Refinement Based on Interaction Relation Hypothesis
8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents
8.6 Analysis and Verification
8.7 Conclusions
Acknowledgments
References
Chapter 9. Incorporating Data and Methodologies for Knowledge Discovery for Crime
9.1 Introduction
9.2 Steps Involved in Crime Investigation
9.3 Data Sources for Crime Data Mining and Investigation
9.4 The Four Types of Knowledge Discovery
9.5 Knowledge Discovery Methodologies for Crime Data
9.6 Methodologies Applied to Knowledge Discovery Types
9.7 Conclusion
References
Index
- Edition: 1
- Published: January 28, 2013
- No. of pages (Hardback): 250
- Imprint: Academic Press
- Language: English
- Paperback ISBN: 9780323282550
- Hardback ISBN: 9780124047020
- eBook ISBN: 9780124059023
CY
Christopher C Yang
WM
Wenji Mao
XZ
Xiaolong Zheng
HW