Intelligent Systems for Security Informatics
Autor Christopher C Yang, Wenji Mao, Xiaolong Zheng, Hui Wangen Limba Engleză Hardback – 15 feb 2013
The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years.
- Pulls together key information on ensuring national security around the world
- The latest research on this subject is concisely presented within the book, with several figures to support the text.
- Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
Preț: 514.87 lei
Preț vechi: 669.38 lei
-23% Nou
Puncte Express: 772
Preț estimativ în valută:
98.54€ • 101.100$ • 83.28£
98.54€ • 101.100$ • 83.28£
Carte tipărită la comandă
Livrare economică 26 februarie-12 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780124047020
ISBN-10: 0124047025
Pagini: 250
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.7 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0124047025
Pagini: 250
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.7 kg
Editura: ELSEVIER SCIENCE
Public țintă
Electrical and Electronic Engineers; Mechanical Engineers; Computer Engineers; Intelligent Systems specialists.Cuprins
- Revealing the Hidden World of the Dark Web: Social Media Forums and Videos
- Proactive Cyber Defense
- Privacy-Preserving Social Network Integration
- A Digraph Model for Risk Identification and Management in SCADA Systems
- High-Level Architecture and Design of a Decision Engine for Marine Safety & Security
- Criminal Identity Resolution Using Personal and Social Identity Attributes: A Collective Resolution Approach
- Importance of Cutting Terrorist Financing
- Study on Covert Networks of Terrorist Based on Interactive Relationship Hypothesis
- Incorporating Data and Methodologies for Knowledge Discover for Crime
Recenzii
"…this book represents a well-written introduction to the subject of intelligent systems for security informatics. The chapters have adequate references and the index is satisfactory. The treatment of topics, the typesetting, and the binding of the hardcover version of the book are praiseworthy. I strongly recommend this book for all those interested in ISI." --ComputingReviews.com, February 6, 2014
"Yang, Mao, Zheng, and Wang survey the most active areas of research in the overlap between intelligence and security. They consider such aspects as social media forums and videos, proactive cyber defense, a high-level architecture and design of a decision engine for marine safety and security, criminal identity resolution using personal and social identity attributes, and a study of covert networks of terrorists…" --Reference and Research Book News, October 2013
"Yang, Mao, Zheng, and Wang survey the most active areas of research in the overlap between intelligence and security. They consider such aspects as social media forums and videos, proactive cyber defense, a high-level architecture and design of a decision engine for marine safety and security, criminal identity resolution using personal and social identity attributes, and a study of covert networks of terrorists…" --Reference and Research Book News, October 2013