Intelligent Systems for Security Informatics

Intelligent Systems for Security Informatics

By (author)  , By (author)  , By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?

Description

The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.

The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years.
show more

Product details

  • Hardback | 250 pages
  • 193.04 x 236.22 x 17.78mm | 566.99g
  • Academic Press Inc
  • San Diego, United States
  • English
  • 0124047025
  • 9780124047020

Table of contents

Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
Proactive Cyber Defense
Privacy-Preserving Social Network Integration
A Digraph Model for Risk Identification and Management in SCADA Systems
High-Level Architecture and Design of a Decision Engine for Marine Safety & Security
Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach
Importance of Cutting Terrorist Financing
Study on Covert Networks of Terrorist Based on Interactive Relationship Hypothesis
Incorporating Data and Methodologies for Knowledge Discover for Crime
show more

Review Text

".this book represents a well-written introduction to the subject of intelligent systems for security informatics. The chapters have adequate references and the index is satisfactory. The treatment of topics, the typesetting, and the binding of the hardcover version of the book are praiseworthy. I strongly recommend this book for all those interested in ISI."-- ComputingReviews.com, February 6, 2014 "Yang, Mao, Zheng, and Wang survey the most active areas of research in the overlap between intelligence and security. They consider such aspects as social media forums and videos, proactive cyber defense, a high-level architecture and design of a decision engine for marine safety and security, criminal identity resolution using personal and social identity attributes, and a study of covert networks of terrorists."-- Reference & Research Book News, October 2013
show more

Review quote

"...this book represents a well-written introduction to the subject of intelligent systems for security informatics. The chapters have adequate references and the index is satisfactory. The treatment of topics, the typesetting, and the binding of the hardcover version of the book are praiseworthy. I strongly recommend this book for all those interested in ISI."--ComputingReviews.com, February 6, 2014 "Yang, Mao, Zheng, and Wang survey the most active areas of research in the overlap between intelligence and security. They consider such aspects as social media forums and videos, proactive cyber defense, a high-level architecture and design of a decision engine for marine safety and security, criminal identity resolution using personal and social identity attributes, and a study of covert networks of terrorists..."--Reference & Research Book News, October 2013
show more