Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism (Englisch)
- Neue Suche nach: Reid, Edna
- Neue Suche nach: Qin, Jialun
- Neue Suche nach: Chung, Wingyan
- Neue Suche nach: Xu, Jennifer
- Neue Suche nach: Zhou, Yilu
- Neue Suche nach: Schumaker, Rob
- Neue Suche nach: Sageman, Marc
- Neue Suche nach: Chen, Hsinchun
- Neue Suche nach: Reid, Edna
- Neue Suche nach: Qin, Jialun
- Neue Suche nach: Chung, Wingyan
- Neue Suche nach: Xu, Jennifer
- Neue Suche nach: Zhou, Yilu
- Neue Suche nach: Schumaker, Rob
- Neue Suche nach: Sageman, Marc
- Neue Suche nach: Chen, Hsinchun
In:
Intelligence and Security Informatics
1
;
125-145
;
2004
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
-
Beteiligte:Reid, Edna ( Autor:in ) / Qin, Jialun ( Autor:in ) / Chung, Wingyan ( Autor:in ) / Xu, Jennifer ( Autor:in ) / Zhou, Yilu ( Autor:in ) / Schumaker, Rob ( Autor:in ) / Sageman, Marc ( Autor:in ) / Chen, Hsinchun ( Autor:in )
-
Erschienen in:Intelligence and Security Informatics , 1 ; 125-145Lecture Notes in Computer Science ; 3073, 1 ; 125-145
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2004
-
Format / Umfang:21 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Aligning Simulation Models of Smallpox OutbreaksChen, Li-Chiou / Kaminsky, Boris / Tummino, Tiffany / Carley, Kathleen M. / Casman, Elizabeth / Fridsma, Douglas / Yahja, Alex et al. | 2004
- 17
-
Data Analytics for Bioterrorism SurveillanceBerndt, Donald J. / Bhat, Sunil / Fisher, John W. / Hevner, Alan R. / Studnicki, James et al. | 2004
- 28
-
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease InformaticsZeng, Daniel / Chen, Hsinchun / Tseng, Chunju / Larson, Catherine / Eidson, Millicent / Gotham, Ivan / Lynch, Cecil / Ascher, Michael et al. | 2004
- 42
-
A Novel Policy and Information Flow Security Model for Active NetworkXia, Zhengyou / Jiang, Yichuan / Zhong, Yiping / Zhang, Shiyong et al. | 2004
- 56
-
A Novel Autonomous Trust Management Model for Mobile AgentsJiang, Yichuan / Xia, Zhengyou / Zhong, Yiping / Zhang, Shiyong et al. | 2004
- 66
-
Privacy-Preserving Inter-database OperationsLiang, Gang / Chawathe, Sudarshan S. et al. | 2004
- 83
-
Finding Unusual Correlation Using Matrix DecompositionsSkillicorn, David B. et al. | 2004
- 100
-
Generating Concept Hierarchies from Text for Intelligence AnalysisWang, Jenq-Haur / Huang, Chien-Chung / Teng, Jei-Wen / Chien, Lee-Feng et al. | 2004
- 114
-
Interactive Query Languages for Intelligence TasksBadia, Antonio et al. | 2004
- 125
-
Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of TerrorismReid, Edna / Qin, Jialun / Chung, Wingyan / Xu, Jennifer / Zhou, Yilu / Schumaker, Rob / Sageman, Marc / Chen, Hsinchun et al. | 2004
- 146
-
The Architecture of the Cornell Knowledge BrokerDemers, Alan / Gehrke, Johannes / Riedewald, Mirek et al. | 2004
- 163
-
Computer-Based Training for Deception Detection: What Users Want?Cao, Jinwei / Lin, Ming / Deokar, Amit / Burgoon, Judee K. / Crews, Janna M. / Adkins, Mark et al. | 2004
- 176
-
Identifying Multi-ID Users in Open ForumsChen, Hung-Ching / Goldberg, Mark / Magdon-Ismail, Malik et al. | 2004
- 187
-
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection TrainingMarett, Kent / Biros, David P. / Knode, Monti L. et al. | 2004
- 201
-
Composite Role-Based Monitoring (CRBM) for Countering Insider ThreatsPark, Joon S. / Ho, Shuyuan Mary et al. | 2004
- 214
-
Critical Infrastructure Integration Modeling and SimulationTolone, William J. / Wilson, David / Raja, Anita / Xiang, Wei-ning / Hao, Huili / Phelps, Stuart / Johnson, E. Wray et al. | 2004
- 226
-
Mining Normal and Intrusive Activity Patterns for Computer Intrusion DetectionLi, Xiangyang / Ye, Nong et al. | 2004
- 239
-
The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication NetworksMofya, Enock Chisonge / Smith, Jonathan Cole et al. | 2004
- 252
-
A Tool for Internet Chatroom SurveillanceÇamtepe, Ahmet / Krishnamoorthy, Mukkai S. / Yener, Bülent et al. | 2004
- 266
-
ChatTrack: Chat Room Topic Detection Using ClassificationBengel, Jason / Gauch, Susan / Mittur, Eera / Vijayaraghavan, Rajan et al. | 2004
- 278
-
SECRETS: A Secure Real-Time Multimedia Surveillance SystemKodali, Naren / Farkas, Csilla / Wijesekera, Duminda et al. | 2004
- 297
-
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic InformationDrineas, Petros / Krishnamoorthy, Mukkai S. / Sofka, Michael D. / Yener, Bülent et al. | 2004
- 307
-
THEMIS: Threat Evaluation Metamodel for Information SystemsFarkas, Csilla / Wingfield, Thomas C. / Michael, James B. / Wijesekera, Duminda et al. | 2004
- 322
-
Balancing Security and Privacy in the 21 st CenturyDemchak, Chris C. / Fenstermacher, Kurt D. et al. | 2004
- 331
-
IT Security Risk Management under Network Effects and Layered Protection StrategyYue, Wei T. / Cakanyildirim, Metin / Ryu, Young U. / Liu, Dengpan et al. | 2004
- 349
-
Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical OperationsRochlin, Gene I. et al. | 2004
- 359
-
Analyzing and Visualizing Criminal Network Dynamics: A Case StudyXu, Jennifer / Marshall, Byron / Kaza, Siddharth / Chen, Hsinchun et al. | 2004
- 378
-
Discovering Hidden Groups in Communication NetworksBaumes, Jeff / Goldberg, Mark / Magdon-Ismail, Malik / Wallace, William Al et al. | 2004
- 390
-
Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network DataLee, Ju-Sung et al. | 2004
- 403
-
Using Speech Act Profiling for Deception DetectionTwitchell, Douglas P. / Nunamaker, Jay F. Jr. / Burgoon, Judee K. et al. | 2004
- 411
-
Testing Various Modes of Computer-Based Training for Deception DetectionGeorge, Joey F. / Biros, David P. / Adkins, Mark / Burgoon, Judee K. / Nunamaker, Jay F. Jr. et al. | 2004
- 418
-
The Use of Data Mining Techniques in Operational Crime FightingAdderley, Richard et al. | 2004
- 426
-
Spatial Forecast Methods for Terrorist Events in Urban EnvironmentsBrown, Donald / Dalton, Jason / Hoyle, Heidi et al. | 2004
- 436
-
Web-Based Intelligence Notification System: Architecture and DesignDolotov, Alexander / Strickler, Mary et al. | 2004
- 449
-
Cross-Lingual Semantics for Crime Analysis Using Associate Constraint NetworkYang, Christopher C. / Li, Kar Wing et al. | 2004
- 457
-
Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion DataLevera, Jorge / Barán, Benjamin / Grossman, Robert et al. | 2004
- 37
-
Information Sharing and Collaboration Policies within Government AgenciesAtabakhsh, Homa / Larson, Catherine / Petersen, Tim / Violette, Chuck / Chen, Hsinchun et al. | 2004
- 476
-
Intrusion-Tolerant Intrusion Detection SystemYi, Myung-Kyu / Hwang, Chong-Sun et al. | 2004
- 484
-
Optimal Redundancy Allocation for Disaster Recovery Planning in the Network EconomyShao, Benjamin B. M. et al. | 2004
- 492
-
Semantic Analysis for Monitoring Insider ThreatsSymonenko, Svetlana / Liddy, Elizabeth D. / Yilmazel, Ozgur / Zoppo, Robert / Brown, Eric / Downey, Matt et al. | 2004
- 501
-
Towards a Social Network Approach for Monitoring Insider Threats to Information SecurityNatarajan, Anand / Hossain, Liaquat et al. | 2004
- 508
-
Policy-Based Information Sharing with SemanticsHughes, Eric / Kazura, Amy / Rosenthal, Arnie et al. | 2004
- 510
-
Determining the Gender of the Unseen Name through HyphenationWarren, Robert H. / Leurer, Christopher et al. | 2004
- 512
-
A Framework for a Secure Federated Patient Healthcare SystemSharman, Raj / Challapalli, Himabindu / Rao, Raghav H. / Upadhyaya, Shambhu et al. | 2004
- 514
-
Vulnerability Analysis and Evaluation within an IntranetPark, Eungki / Seo, Jung-Taek / Im, Eul Gyu / Lee, Cheol-Won et al. | 2004
- 516
-
Security Informatics: A Paradigm Shift in Information Technology EducationMerritt, Susan M. / Stix, Allen / Sullivan, Judith E. et al. | 2004
- 518
-
Research of Characteristics of Worm TrafficChen, Yufeng / Dong, Yabo / Lu, Dongming / Xiang, Zhengtao et al. | 2004
- 520
-
MIPT: Sharing Terrorism Information ResourcesEllis, James O. III et al. | 2004
- 526
-
Post-9/11 Evolution of Al QaedaGunaratna, Rohan et al. | 2004
- 531
-
Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to TerrorismSinai, Joshua et al. | 2004