Coverart for item
The Resource Intelligent systems for security informatics, Christopher C. Yang [and others]

Intelligent systems for security informatics, Christopher C. Yang [and others]

Label
Intelligent systems for security informatics
Title
Intelligent systems for security informatics
Statement of responsibility
Christopher C. Yang [and others]
Contributor
Subject
Language
eng
Summary
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the worldThe latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
Member of
Cataloging source
OPELS
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
Intelligent systems series
Intelligent systems for security informatics, Christopher C. Yang [and others]
Label
Intelligent systems for security informatics, Christopher C. Yang [and others]
Link
http://libproxy.rpi.edu/login?url=http://www.sciencedirect.com/science/book/9780124047020
Publication
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Chapter 1. Revealing the hidden world of the dark web : social media forums and videos -- chapter 2. Proactive cyber defense -- chapter 3. Privacy-preserving social network integration, analysis, and mining -- chapter 4. A digraph model for risk identification and management in SCADA systems -- chapter 5. High-level architecture and design of a decision engine for marine safety and security -- chapter 6. Criminal identity resolution using personal and social identity attributes : a collective resolution approach -- chapter 7. Al Qaeda terrorist financing -- chapter 8. Study on covert networks of terrorists based on interactive relationship hypothesis -- chapter 9. Incorporating data and methodologies for knowledge discovery for crime
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9780124059023&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4170799'}
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9780124059023
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...