Skip to:Content
|
Bottom
Cover image for Advances in intelligence and security informatics
Title:
Advances in intelligence and security informatics
Personal Author:
Series:
Intelligent systems series
Edition:
1st ed.
Publication Information:
Oxford, U.K. ; Waltham, M.A. : Academic Press ; [Hangzhou, China] : Zhejiang University Press, 2012
Physical Description:
xi, 107 p. : ill. ; 25 cm.
ISBN:
9780123972002
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010303858 QA76.9.A25 M335 2012 Open Access Book Book
Searching...

On Order

Summary

Summary

The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.

Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. This book provides a comprehensive and interdisciplinary account of the new advances in ISI area along three fundamental dimensions: methodological issues in security informatics; new technological developments to support security-related modeling, detection, analysis and prediction; and applications and integration in interdisciplinary socio-cultural fields.


Author Notes

Wenji Mao, Associate Professor, State Key Laboratory of Management and Control for Complex Systems, Institute of Automation, Chinese Academy of Sciences. Prof. Mao has published widely in ACM-, JEEE- and AAAI-sponsored journals arid conference proceedings, and serves as co-chairs and on the organizing and program committees of various international conferences and workshops on security informatics, social computing and intelligent agents. She is a member of ACM, AAAI, INFORMS and serves on the Technical Committee on Homeland Security of the IEEE Systems, Man, Cybernetics Society.
Fei-Yue Wang, Professor, NUDT, Chinese Academy of Sciences. Currently, Prof. Wang is the Editor-in-Chief of the IEEE Intelligent Systems and IEEE Transactions on Intelligent Transportation Systems. He is a Fellow of IEEE, INCOSE, IFAC, ASME, and AAAS. In 2007, he received the 2nd Class National Prize in Natural Sciences of China and was awarded ACM Distinguished Scientist for his work in intelligent systems and social computing. In 2011, he received IEEE ITSS Outstanding ITS Research Award.


Table of Contents

Prefacep. ix
Acknowledgementsp. xi
Chapter 1 Intelligence and Security Informatics: Research Frameworksp. 1
1.1 Research Methodology and Frameworks for ISIp. 1
1.2 The ACP Approachp. 2
1.2.1 Modeling with Artificial Societiesp. 2
1.2.2 Analysis with Computational Experimentsp. 3
1.2.3 Control Through Parallel Executionp. 3
1.2.4 Foundations in Philosophy and Physicsp. 4
1.3 Outline of Chaptersp. 5
Chapter 2 Agent Modeling of Terrorist Organization Behaviorp. 9
2.1 Modeling Organizational Behaviorp. 9
2.2 Action Extraction from the Webp. 10
2.2.1 Action Data Collectionp. 10
2.2.2 Raw Action Extractionp. 10
2.2.3 Action Eliminationp. 11
2.2.4 Action Refinementp. 11
2.3 Extracting Causal Knowledge from the Webp. 11
2.4 Construction of Action Hierarchyp. 13
2.5 Designing, Causal Scenariosp. 15
2.6 Case Study on Terrorist Organizationp. 16
2.7 Conclusionp. 18
Chapter 3 Security Story Generation for Computational Experimentsp. 21
3.1 Story Generation Systemsp. 21
3.2 System Workflow and Narrative Structurep. 23
3.3 Story Extraction Approachp. 25
3.3.1 Text Processing with Domain Knowledgep. 25
3.3.2 Event Detection and Event Element Extractionp. 26
3.3.3 Design and Organization of Patternsp. 27
3.3.4 Event Element Standardizationp. 28
3.3.5 Evaluation of Event Relationsp. 29
3.4 Experimentp. 29
3.5 Conclusionp. 30
Chapter 4 Forecasting Croup Behavior via Probabilistic Plan Inferencep. 33
4.1 Review of Plan-Based Inferencep. 34
4.2 Probabilistic Plan Representationp. 35
4.3 Probabilistic Reasoning Approachp. 36
4.3.1 Notationp. 36
4.3.2 Computationp. 36
4.4 Case Study in Security Informaticsp. 39
4.4.1 Construction of Plan Libraryp. 39
4.4.2 The Test Setp. 40
4.4.3 Experimental Resultsp. 42
4.5 Conclusionp. 43
Chapter 5 Forecasting Complex Croup Behavior via Multiple Plan Recognitionp. 45
5.1 Multiple Plan Recognition for Behavior Predictionp. 46
5.2 The MPR Problem Definitionp. 47
5.3 The Proposed MPR Approachp. 49
5.3.1 Constructing the Explanation Graphp. 49
5.3.2 Computing Probability of an Explanationp. 51
5.3.3 Finding the Best Explanationp. 53
5.3.4 Algorithm and Complexity Analysisp. 53
5.3.5 Discussionp. 55
5.4 Case Study in Security Informaticsp. 55
5.4.1 Experimental Designp. 56
5.4.2 Resultsp. 57
5.5 Conclusionp. 58
Chapter 6 Social Computing in ISI: A Synthetic Viewp. 61
6.1 Social Computingp. 61
6.1.1 Theoretical and Infrastructure Underpinningsp. 62
6.1.2 Major Application Areasp. 64
6.2 A Social Computing-Based ISI Research Frameworkp. 64
6.2.1 Modeling with Artificial Societiesp. 65
6.2.2 Analysis with Computational Experimentsp. 66
6.2.3 Control and Management Through Parallel Executionp. 66
6.3 Main Issues in the ACP-Based ISI Research Frameworkp. 66
6.3.1 Modeling Cyber-Physical Societiesp. 66
6.3.2 Scenario-Based Computational Experiment and Evaluationp. 67
6.3.3 Interactive Co-Evolution of Artificial and Actual Systemsp. 68
6.3.4 Social Media Information Processing and Standardizationp. 69
6.3.5 ISI Research Platformp. 69
6.4 Summaryp. 70
Chapter 7 Cyber-Enabled Social Movement Organizationsp. 73
7.1 Studies on Social Movement Organizations: A Reviewp. 74
7.2 A New Research Framework for CeSMOsp. 76
7.2.1 CeSMO Research Questionsp. 76
7.2.2 A Social Computing-Based CeSMO Research Frameworkp. 76
7.3 Case Study: Wenchuan Earthquakep. 77
7.4 Discussions on CeSMO Research Issuesp. 85
7.4.1 CeSMO Behavior Modelingp. 86
7.4.2 CeSMO Network Analysisp. 86
7.4.3 CeSMO Social and Cultural Information Modeling and Analysisp. 86
7.4.4 CeSMO Behavior Predictionp. 87
7.5 Conclusionp. 87
Chapter 8 Cultural Modeling for Behavior Analysis and Predictionp. 91
8.1 Modeling Cultural Data in Security Informaticsp. 92
8.2 Major Machine Learning Methodsp. 93
8.2.1 Naive Bayesian (NB)p. 93
8.2.2 Support Vector Machines (SVMs)p. 93
8.2.3 Artificial Neural Networksp. 93
8.2.4 k-Nearest Neighbor (kNN)p. 93
8.2.5 Decision Treesp. 94
8.2.6 Random Forest (RF)p. 94
8.2.7 Associative Classification (AC)p. 94
8.3 Experiment and Analysisp. 94
8.3.1 Datasetsp. 94
8.3.2 Evaluation Measuresp. 95
8.3.3 Experimental Resultsp. 96
8.3.4 Observations and Analysisp. 96
8.4 Discussions on Cultural Modeling Research Issuesp. 98
8.4.1 Cultural Datasets Constructionp. 98
8.4.2 Attribute Selectionp. 98
8.4.3 Best Performance of Classifiersp. 99
8.4.4 Handling the Class Imbalance Problemp. 99
8.4.5 Model Interpretabilityp. 99
8.4.6 Incorporation of Domain Knowledgep. 100
8.4.7 Cultural and Social Dynamics of Behavioral Patternsp. 100
8.5 Conclusionp. 100
Indexp. 103
Go to:Top of Page