Intelligence and Security Informatics for International Security Information Sharing and Data Mining /

On September 11, 2001 the World became cognizant of the security challenges it faces on an international scale. With this awareness a commitment has come from the scientific, engineering, and health communities to help the world meet an array of security challenges. From these activities the science...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Chen, Hsinchun (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2006.
Σειρά:Integrated Series in Information Systems, 10
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03667nam a22005775i 4500
001 978-0-387-30332-1
003 DE-He213
005 20151204180441.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 |a 9780387303321  |9 978-0-387-30332-1 
024 7 |a 10.1007/0-387-30332-4  |2 doi 
040 |d GrThAP 
050 4 |a QA75.5-76.95 
072 7 |a UT  |2 bicssc 
072 7 |a COM069000  |2 bisacsh 
072 7 |a COM032000  |2 bisacsh 
082 0 4 |a 005.7  |2 23 
100 1 |a Chen, Hsinchun.  |e author. 
245 1 0 |a Intelligence and Security Informatics for International Security  |h [electronic resource] :  |b Information Sharing and Data Mining /  |c by Hsinchun Chen. 
264 1 |a Boston, MA :  |b Springer US,  |c 2006. 
300 |a XVIII, 182 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Integrated Series in Information Systems,  |x 1571-0270 ;  |v 10 
505 0 |a Intelligence and Security Informatics (ISI): Challenges and Opportunities -- An ISI Research Framework: Information Sharing and Data Mining -- ISI Research: Literature Review -- National Security Critical Mission Areas and Case Studies -- Intelligence and Warning -- Border and Transportation Security -- Domestic Counter-Terrorism -- Protecting Critical Infrastructure and Key Assets -- Defending Against Catastrophic Terrorism -- Emergency Preparedness and Response -- The Partnership and Collaboration Framework -- Conclusions and Future Directions -- Acknowledgements -- References. 
520 |a On September 11, 2001 the World became cognizant of the security challenges it faces on an international scale. With this awareness a commitment has come from the scientific, engineering, and health communities to help the world meet an array of security challenges. From these activities the science of "Intelligence and Security Informatics" is emerging, which will influence a new generation of policy makers, practitioners, researchers, and students. INTELLIGENCE AND SECURITY INFORMATICS FOR INTERNATIONAL SECURITY: Information Sharing and Data Mining presents a systematic national security research framework, and discusses IT technical components, and directions. The book reflects a decade of leading-edge research on intelligence and security informatics from the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research, as well as the application in real-world community situations by the center’s director and the book’s author, Dr. Hsinchun Chen. 
650 0 |a Computer science. 
650 0 |a Information technology. 
650 0 |a Business  |x Data processing. 
650 0 |a Political science. 
650 0 |a Computer organization. 
650 0 |a Data structures (Computer science). 
650 0 |a Computers. 
650 0 |a Artificial intelligence. 
650 1 4 |a Computer Science. 
650 2 4 |a Information Systems and Communication Service. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a IT in Business. 
650 2 4 |a Artificial Intelligence (incl. Robotics). 
650 2 4 |a Computer Systems Organization and Communication Networks. 
650 2 4 |a Political Science. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387243795 
830 0 |a Integrated Series in Information Systems,  |x 1571-0270 ;  |v 10 
856 4 0 |u http://dx.doi.org/10.1007/0-387-30332-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)