You are previewing Advances in Intelligence and Security Informatics.
O'Reilly logo
Advances in Intelligence and Security Informatics

Book Description

The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.

Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. This book provides a comprehensive and interdisciplinary account of the new advances in ISI area along three fundamental dimensions: methodological issues in security informatics; new technological developments to support security-related modeling, detection, analysis and prediction; and applications and integration in interdisciplinary socio-cultural fields.



        • Identifies emerging directions in ISI research and applications that address the research challenges with advanced technologies
        • Provides an integrated account of the new advances in ISI field in three core aspects: methodology, technological developments and applications
        • Benefits researchers as well as security professionals who are involved in cutting-edge research and applications in security informatics and related fields
          •  

      Table of Contents

      1. Cover Image
      2. Table of Contents
      3. Title
      4. Intelligent Systems Series
      5. Copyright
      6. Preface
      7. Chapter 1. Intelligence and Security Informatics
        1. 1.1 Research Methodology and Frameworks for ISI
        2. 1.2 The ACP Approach
        3. 1.3 Outline of Chapters
        4. REFERENCES
      8. Chapter 2. Agent Modeling of Terrorist Organization Behavior
        1. 2.1 Modeling Organizational Behavior
        2. 2.2 Action Extraction from the Web
        3. 2.3 Extracting Causal Knowledge from the Web
        4. 2.4 Construction of Action Hierarchy
        5. 2.5 Designing Causal Scenarios
        6. 2.6 Case Study on Terrorist Organization
        7. 2.7 Conclusion
        8. REFERENCES
      9. Chapter 3. Security Story Generation for Computational Experiments
        1. 3.1 Story Generation Systems
        2. 3.2 System Workflow and Narrative Structure
        3. 3.3 Story Extraction Approach
        4. 3.4 Experiment
        5. 3.5 Conclusion
        6. REFERENCES
      10. Chapter 4. Forecasting Group Behavior via Probabilistic Plan Inference
        1. 4.1 Review of Plan-Based Inference
        2. 4.2 Probabilistic Plan Representation
        3. 4.3 Probabilistic Reasoning Approach
        4. 4.4 Case Study in Security Informatics
        5. 4.5 Conclusion
        6. REFERENCES
      11. Chapter 5. Forecasting Complex Group Behavior via Multiple Plan Recognition
        1. 5.1 Multiple Plan Recognition for Behavior Prediction
        2. 5.2 The MPR Problem Definition
        3. 5.3 The Proposed MPR Approach
        4. 5.4 Case Study in Security Informatics
        5. 5.5 Conclusion
        6. REFERENCES
      12. Chapter 6. Social Computing in ISI
        1. 6.1 Social Computing
        2. 6.2 A Social Computing-Based ISI Research Framework
        3. 6.3 Main Issues in the ACP-Based ISI Research Framework
        4. 6.4 Summary
        5. REFERENCES
      13. Chapter 7. Cyber-Enabled Social Movement Organizations
        1. 7.1 Studies on Social Movement Organizations: A Review
        2. 7.2 A New Research Framework for CeSMOs
        3. 7.3 Case Study: Wenchuan Earthquake
        4. 7.4 Discussions on CeSMO Research Issues
        5. 7.5 Conclusion
        6. REFERENCES
      14. Chapter 8. Cultural Modeling for Behavior Analysis and Prediction
        1. 8.1 Modeling Cultural Data in Security Informatics
        2. 8.2 Major Machine Learning Methods
        3. 8.3 Experiment and Analysis
        4. 8.4 Discussions on Cultural Modeling Research Issues
        5. 8.5 Conclusion
        6. REFERENCES
      15. Index