A data mining approach to intelligence operations

被引:1
|
作者
Memon, Nasrullah [1 ,2 ]
Hicks, David L. [1 ]
Harkiolakis, Nicholas [2 ]
机构
[1] Aalborg Univ, European Ctr Counterterrorism Res & Studies, Niels Bohrs Vej 8, DK-6700 Esbjerg, Denmark
[2] Hellen Amer Univ, Athens, Greece
关键词
data mining for counterterrorism; IDM tasks; intelligence operations; social network analysis; terrorist networks; terrorism;
D O I
10.1117/12.780835
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we examine the latest thinking, approaches and methodologies in use for finding the nuggets of information and subliminal (and perhaps intentionally hidden) patterns and associations that are critical to identify criminal activity and suspects to private and government security agencies. An emphasis in the paper is placed on Social Network Analysis and Investigative Data Mining, and the use of these technologies in the counterterrorism domain. Tools and techniques from both areas are described, along with the important tasks for which they can be used to assist with the investigation and analysis of terrorist organizations. The process of collecting data about these organizations is also considered along with the inherent difficulties that are involved.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] A knowledge management approach to data mining process for business intelligence
    Wang, Hai
    Wang, Shouhong
    [J]. INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2008, 108 (5-6) : 622 - 634
  • [2] Computational intelligence approach for gene expression data mining and classification
    Wang, ZY
    Kung, SY
    Zhang, JY
    Khan, J
    Xuan, JH
    Wang, Y
    [J]. 2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL III, PROCEEDINGS, 2003, : 449 - 452
  • [3] An Approach to Study Collective Intelligence Based on Networked Data Mining
    Zhao Dongjie
    Zhang Haisu
    Han Yanni
    Yang Haitao
    He Yu
    [J]. 2011 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION AND INDUSTRIAL APPLICATION (ICIA2011), VOL IV, 2011, : 238 - 242
  • [4] An Approach to Study Collective Intelligence Based on Networked Data Mining
    Zhao Dongjie
    Zhang Haisu
    Han Yanni
    Yang Haitao
    He Yu
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IX, 2010, : 239 - 243
  • [5] Operations research and data mining
    Olafsson, Sigurdur
    Li, Xiaonan
    Wu, Shuning
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2008, 187 (03) : 1429 - 1448
  • [6] Computational intelligence for data mining
    Embrechts, MJ
    [J]. 2001 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: E-SYSTEMS AND E-MAN FOR CYBERNETICS IN CYBERSPACE, 2002, : 1484 - 1484
  • [7] Data mining for Web intelligence
    Han, JW
    Chang, KCC
    [J]. COMPUTER, 2002, 35 (11) : 64 - +
  • [8] Introduction to operations research and data mining
    Olafsson, S
    [J]. COMPUTERS & OPERATIONS RESEARCH, 2006, 33 (11) : 3067 - 3069
  • [9] Synergies of Operations Research and Data Mining
    Meisel, Stephan
    Mattfeld, Dirk
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2010, 206 (01) : 1 - 10
  • [10] Applying swarm intelligence and data mining approach in detecting online and digital theft
    Bejandi, Saba Malekpour
    Taghva, Mohammad Reza
    Hanafizadeh, Payam
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 19 (1-2) : 142 - 167