全部版块 我的主页
论坛 新商科论坛 四区(原工商管理论坛) 商学院 管理信息系统
2494 2
2013-04-28
Studies in Computational Intelligence
              Volume              1352008
Intelligence and Security InformaticsTechniques and ApplicationsEditors:
ISBN: 978-3-540-69207-2 (Print) 978-3-540-69209-6  (Online)

Intelligence and Security Informatics

Techniques and Applications

Series: Studies in Computational Intelligence, Vol. 135

Chen, Hsinchun; Yang, Christopher C. (Eds.)


2008

ISBN 978-3-540-69209-6

  Immediately available per PDF-download (no DRM, watermarked)


About this book
  • Latest research on intelligence and security informatics
Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at http://www.isiconference.org/. These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research.
The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.

Table of contents Unit 1: Terrorism Informatics and Data Mining.- Unit 2: Interlligence and Crime Analysis.- Unit 3: Access Control, Infrastructure Protection and Privacy.- Unit 4: Surveillance and Emergency Response.

Intelligence and Security Informatics.pdf
大小:(27.29 MB)

只需: 4 个论坛币  马上下载









二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

全部回复
2013-8-18 14:24:41
这书值得共享!
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2013-9-19 08:29:06
最新研究情报与安全信息
情报与安全信息(ISI)2001年9月11日的悲惨事件后,已经成为一个重要的研究领域。计算机和信息科学的研究人员有一个独特的机会和义务,通过先进的IT研究对国际安全做出贡献。自2003年以来,已在美国举办的一系列会议上ISI自2006年以来,亚太地区和欧洲自2008年以来。这一系列会议的更多细节,可以发现在http://www.isiconference.org/。通过这些活动,汇集研究人员,从业者和决策者,以支持反恐和国土安全的使命。这本书,情报与安全信息技术与应用,呈现作品讨论反恐情报,信息共享,数据挖掘,情报和犯罪分析,基础设施保护,隐私保护,信息监控,应急响应的集合。来自九个不同国家的作者和贡献的先进和高影响ISI研究共22章。
这本书的受众包括:(1)(2)公共部门和私营部门的从业者在国家/国际和国土安全区;顾问及承建商,从事持续的关系与联邦,州,当地和国际机构的有关项目国家安全(3)研究生层次的学生在计算机科学,信息科学,公共政策,信息安全,犯罪和恐怖主义研究;(4)研究人员从事安全信息,国土安全,信息,政策,知识管理,公共政策,以及反恐调研
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

相关推荐
栏目导航
热门文章
推荐文章

说点什么

分享

扫码加好友,拉您进群
各岗位、行业、专业交流群