Coverart for item
The Resource Intelligent systems for security informatics, Christopher C. Yang [and others]

Intelligent systems for security informatics, Christopher C. Yang [and others]

Label
Intelligent systems for security informatics
Title
Intelligent systems for security informatics
Statement of responsibility
Christopher C. Yang [and others]
Contributor
Subject
Language
eng
Summary
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
Member of
Cataloging source
OPELS
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
I58 2013
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Yang, Christopher C
Series statement
Intelligent systems series
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Information technology
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer networks
  • Computer security
  • Information technology
Label
Intelligent systems for security informatics, Christopher C. Yang [and others]
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Chapter 1. Revealing the hidden world of the dark web : social media forums and videos -- chapter 2. Proactive cyber defense -- chapter 3. Privacy-preserving social network integration, analysis, and mining -- chapter 4. A digraph model for risk identification and management in SCADA systems -- chapter 5. High-level architecture and design of a decision engine for marine safety and security -- chapter 6. Criminal identity resolution using personal and social identity attributes : a collective resolution approach -- chapter 7. Al Qaeda terrorist financing -- chapter 8. Study on covert networks of terrorists based on interactive relationship hypothesis -- chapter 9. Incorporating data and methodologies for knowledge discovery for crime
Control code
827935868
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9780124059023
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000362
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)827935868
Label
Intelligent systems for security informatics, Christopher C. Yang [and others]
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Chapter 1. Revealing the hidden world of the dark web : social media forums and videos -- chapter 2. Proactive cyber defense -- chapter 3. Privacy-preserving social network integration, analysis, and mining -- chapter 4. A digraph model for risk identification and management in SCADA systems -- chapter 5. High-level architecture and design of a decision engine for marine safety and security -- chapter 6. Criminal identity resolution using personal and social identity attributes : a collective resolution approach -- chapter 7. Al Qaeda terrorist financing -- chapter 8. Study on covert networks of terrorists based on interactive relationship hypothesis -- chapter 9. Incorporating data and methodologies for knowledge discovery for crime
Control code
827935868
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9780124059023
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000362
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)827935868

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...