Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.
Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. This book provides a comprehensive and interdisciplinary account of the new advances in ISI area along three fundamental dimensions: methodological issues in security informatics; new technological developments to support security-related modeling, detection, analysis and prediction; and applications and integration in interdisciplinary socio-cultural fields.
- Identifies emerging directions in ISI research and applications that address the research challenges with advanced technologies
- Provides an integrated account of the new advances in ISI field in three core aspects: methodology, technological developments and applications
- Benefits researchers as well as security professionals who are involved in cutting-edge research and applications in security informatics and related fields
Computer Engineers; Intelligent Systems specialists. Security professionals
Intelligent Systems Series
Chapter 1. Intelligence and Security Informatics
1.1 Research Methodology and Frameworks for ISI
1.2 The ACP Approach
1.3 Outline of Chapters
Chapter 2. Agent Modeling of Terrorist Organization Behavior
2.1 Modeling Organizational Behavior
2.2 Action Extraction from the Web
2.3 Extracting Causal Knowledge from the Web
2.4 Construction of Action Hierarchy
2.5 Designing Causal Scenarios
2.6 Case Study on Terrorist Organization
Chapter 3. Security Story Generation for Computational Experiments
3.1 Story Generation Systems
3.2 System Workflow and Narrative Structure
3.3 Story Extraction Approach
Chapter 4. Forecasting Group Behavior via Probabilistic Plan Inference
4.1 Review of Plan-Based Inference
4.2 Probabilistic Plan Representation
4.3 Probabilistic Reasoning Approach
4.4 Case Study in Security Informatics
Chapter 5. Forecasting Complex Group Behavior via Multiple Plan Recognition
5.1 Multiple Plan Recognition for Behavior Prediction
5.2 The MPR Problem Definition
5.3 The Proposed MPR Approach
5.4 Case Study in Security Informatics
Chapter 6. Social Computing in ISI
6.1 Social Computing
6.2 A Social Computing-Based ISI Research Framework
6.3 Main Issues in the ACP-Based ISI Research Framework
Chapter 7. Cyber-Enabled Social Movement Organizations
7.1 Studies on Social Movement Organizations: A Review
7.2 A New Research Framework for CeSMOs
7.3 Case Study: Wenchuan Earthquake
7.4 Discussions on CeSMO Research Issues
Chapter 8. Cultural Modeling for Behavior Analysis and Prediction
8.1 Modeling Cultural Data in Security Informatics
8.2 Major Machine Learning Methods
8.3 Experiment and Analysis
8.4 Discussions on Cultural Modeling Research Issues
- No. of pages:
- © Academic Press 2012
- 13th April 2012
- Academic Press
- Hardcover ISBN:
- eBook ISBN:
Chinese Academy of Sciences
Professor Institute of Automation, Chinese Academy of Sciences.
"Mao and Wang explain that the new field of intelligence and security informatics seeks to develop advanced information technologies, systems, algorithms, and databases for security-related applications." --Reference and Research Book News, August 2013
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.