My Account Log in

1 option

Advances in intelligence and security informatics / Wenji Mao and Fei-Yue Wang.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Mao, Wenji.
Contributor:
Wang, Fei-Yue.
Series:
Intelligent systems series.
Intelligent systems series
Language:
English
Subjects (All):
Computer security.
National security.
Physical Description:
1 online resource (129 p.)
Edition:
1st ed.
Other Title:
New advances in intelligence and security informatics
Place of Publication:
Amsterdam ; Boston : Elsevier/AP : Zhejiang University Press, c2012.
Language Note:
English
System Details:
text file
Summary:
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international
Contents:
Front cover; Half title page; Zhejiang University Press Intelligent Systems Series; Chief Editor; Editorial Board Members; Advances in Intelligence and Security Informatics; Copyright page; Table of Contents; Preface; Acknowledgements; Chapter 1 Intelligence and Security Informatics; 1.1 Research Methodology and Frameworks for ISI; 1.2 The ACP Approach; 1.2.1 Modeling with Artificial Societies; 1.2.2 Analysis with Computational Experiments; 1.2.3 Control Through Parallel Execution; 1.2.4 Foundations in Philosophy and Physics; 1.3 Outline of Chapters; References
Chapter 2 Agent Modeling of Terrorist Organization Behavior2.1 Modeling Organizational Behavior; 2.2 Action Extraction from the Web; 2.2.1 Action Data Collection; 2.2.2 Raw Action Extraction; 2.2.3 Action Elimination; 2.2.4 Action Refinement; 2.3 Extracting Causal Knowledge from the Web; 2.4 Construction of Action Hierarchy; 2.5 Designing Causal Scenarios; 2.6 Case Study on Terrorist Organization; 2.7 Conclusion; References; Chapter 3 Security Story Generation for Computational Experiments; 3.1 Story Generation Systems; 3.2 System Workflow and Narrative Structure
3.3 Story Extraction Approach3.3.1 Text Processing with Domain Knowledge; 3.3.2 Event Detection and Event Element Extraction; 3.3.3 Design and Organization of Patterns; 3.3.4 Event Element Standardization; Number Conversion; Time Standardization; Location Standardization; 3.3.5 Evaluation of Event Relations; 3.4 Experiment; 3.5 Conclusion; References; Chapter 4 Forecasting Group Behavior via Probabilistic Plan Inference; 4.1 Review of Plan-Based Inference; 4.2 Probabilistic Plan Representation; 4.3 Probabilistic Reasoning Approach; 4.3.1 Notation; 4.3.2 Computation; Probability of States
Probability of Action ExecutionOutcome Probability and Expected Utility of Actions; Outcome Probability of Plans and Expected Plan Utility; 4.4 Case Study in Security Informatics; 4.4.1 Construction of Plan Library; 4.4.2 The Test Set; 4.4.3 Experimental Results; 4.5 Conclusion; References; Chapter 5 Forecasting Complex Group Behavior via Multiple Plan Recognition; 5.1 Multiple Plan Recognition for Behavior Prediction; 5.2 The MPR Problem Definition; 5.3 The Proposed MPR Approach; 5.3.1 Constructing the Explanation Graph; Observed Actions; Observed States
5.3.2 Computing Probability of an Explanation5.3.3 Finding the Best Explanation; 5.3.4 Algorithm and Complexity Analysis; Algorithm (Plan Library PL, Observation Set O); Complexity; 5.3.5 Discussion; 5.4 Case Study in Security Informatics; 5.4.1 Experimental Design; 5.4.2 Results; 5.5 Conclusion; References; Chapter 6 Social Computing in ISI; 6.1 Social Computing; 6.1.1 Theoretical and Infrastructure Underpinnings; 6.1.2 Major Application Areas; 6.2 A Social Computing-Based ISI Research Framework; 6.2.1 Modeling with Artificial Societies; 6.2.2 Analysis with Computational Experiments
6.2.3 Control and Management Through Parallel Execution
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
ISBN:
9786613611048
9781280581267
1280581263
9780123973245
0123973244
OCLC:
817081134

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account