Home Page Icon
Home Page
Table of Contents for
Title page
Close
Title page
by Hui Wang, Xiaolong Zheng, Wenji Mao, Christopher C Yang
Intelligent Systems for Security Informatics
Cover image
Title page
Table of Contents
Series Page
Copyright
Preface
Chapter 1. Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
1.1 Introduction
1.2 The Dark Web Forum Portal
1.3 The Video Portal
1.4 Conclusion and Future Directions
Acknowledgments
References
Chapter 2. Proactive Cyber Defense
2.1 Introduction
2.2 Proactive Filters
2.3 Early Warning
2.4 Concluding Remarks
Acknowledgments
References
Chapter 3. Privacy-Preserving Social Network Integration, Analysis, and Mining
3.1 Social Network Analysis and Mining
3.2 Privacy Preservation
3.3 Information Integration and Privacy Preservation for SNAM
3.4 Conclusion
References
Chapter 4. A Digraph Model for Risk Identification and Management in SCADA Systems
4.1 Introduction
4.2 Background
4.3 A Digraph Model of SCADA Systems
4.4 Conclusions
References
Chapter 5. High-Level Architecture and Design of a Decision Engine for Marine Safety and Security
5.1 Introduction
5.2 Background
5.3 Conceptual Design
5.4 Formal Representation
5.5 Application
5.6 Conclusions and Future Work
Acknowledgments
References
Chapter 6. Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach
6.1 Introduction
6.2 Related Work
6.3 A Collective Identity Resolution Approach
6.4 Experiments
6.5 Concluding Remarks
References
Chapter 7. Al Qaeda Terrorist Financing
7.1 Importance of Cutting Terrorist Financing
7.2 Description of Al Qaeda’s Financial Network
7.3 History and Development of Al Qaeda and its Financial Network
7.4 Organizational Structure: Control Over Finances Within Al Qaeda
7.5 Al Qaeda’s Portfolio and Sources of “Revenues”
7.6 Methods of Transferring and Storing Funds
References
Chapter 8. Study on Covert Networks of Terrorists Based on Interactive Relationship Hypothesis
8.1 Introduction
8.2 Relevant Works
8.3 Initial Network Construction
8.4 Network Refinement Based on Interaction Relation Hypothesis
8.5 Relationship Network Refinement and Final Relationship Network of Terrorist Organizations and Incidents
8.6 Analysis and Verification
8.7 Conclusions
Acknowledgments
References
Chapter 9. Incorporating Data and Methodologies for Knowledge Discovery for Crime
9.1 Introduction
9.2 Steps Involved in Crime Investigation
9.3 Data Sources for Crime Data Mining and Investigation
9.4 The Four Types of Knowledge Discovery
9.5 Knowledge Discovery Methodologies for Crime Data
9.6 Methodologies Applied to Knowledge Discovery Types
9.7 Conclusion
References
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover image
Next
Next Chapter
Table of Contents
Intelligent Systems for Security Informatics
Christopher Yang
Wenji Mao
Xiaolong Zheng
Hui Wang
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset