Index

Note: Page numbers with “f” denote figures; “t” tables.

0-9

9/11 Commission Report, 107–108
∞-tolerance of privacy leakage, 56

A

Abstract State Machines (ASM), 87, 100
Decision Engine specifications, 101–103
decision management, 102f
evaluation, 103f
goal management, 101f
plan management, 102f
system domains, 101f
Abu Sayyaf Group, 137–138
Academic social networks, 52
Actionable mining and predictive analysis (AMPA) methodology, 194–195
Actions, 89
Active adversary attacks, 55
Add-word (AW) attack, 40
Ahmidan, Jamal, 143
Al Haramain Islamic Foundation (IBID), 137
Al Nur Honey Press Shops, 139–140
Al Qaeda, history and development, 128–132
Al Qaeda in the Islamic Maghreb (AQIM), 142–143
Al Qaeda terrorist financing
charities, 135–139
criminal ...

Get Intelligent Systems for Security Informatics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.