Preface

The Intelligence and Security Informatics conference series, which includes the IEEE International Conference on Intelligence and Security Informatics (IEEE ISI), the European Intelligence and Security Informatics Conference (EISIC), and the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI), started about a decade ago. Since then, it has brought together many academic researchers, law enforcement and intelligence experts, and information technology consultants and experts to discuss their research and practices. The topics in ISI include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. In this book, we have covered the most active research work in recent years.

The intended readership of this book includes (i) public and private sector practitioners in the national/international and homeland security area, (ii) consultants and contractors engaged in ongoing relationships with federal, state, local, and international agencies on projects related to national security, (iii) graduate-level students in Information Sciences, Public Policy, Computer Science, Information Assurance, and Terrorism, and (iv) researchers engaged in security informatics, homeland security, information policy, knowledge management, public administration, and counter-terrorism.

We hope that readers will find the book valuable and useful in their study or work. We also hope that the book will contribute to the ISI community. Researchers and practitioners in this community will continue to grow and share research findings to contribute to national safety around the world.

Christopher C. Yang, Drexel University

Wenji Mao, Chinese Academy of Sciences

Xiaolong Zheng, Chinese Academy of Sciences

Hui Wang, National University of Defense Technology

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset