Automating the analysis and cataloging of sky surveys
Advances in knowledge discovery and data mining
Inferring Web communities from link topology
Proceedings of the ninth ACM conference on Hypertext and hypermedia : links, objects, time and space---structure in hypermedia systems: links, objects, time and space---structure in hypermedia systems
Comparing noun phrasing techniques for use with medical digital library tools
Journal of the American Society for Information Science - Special topic issue on digital libraries: part 2
Data mining: concepts and techniques
Data mining: concepts and techniques
Data mining case study: modeling the behavior of offenders who commit serious sexual assaults
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Evolving data into mining solutions for insights
Communications of the ACM - Evolving data mining into solutions for insights
Advent of Netwar
Social, ethical and legal issues of data mining
Data mining
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings (Lecture Notes in Computer Science)
Authorship analysis in cybercrime investigation
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Internet Auction Fraud Detection Using Social Network Analysis and Classification Tree Approaches
International Journal of Electronic Commerce
Hi-index | 0.00 |
In this paper we discuss technical issues regarding intelligence and security informatics (ISI) research to accomplish the critical missions of international security and counter-terrorism. We propose a research framework addressing the technical challenges facing counter-terrorism and crime-fighting applications with a primary focus on the knowledge discovery from databases (KDD) perspective. We also present several Dark Web related case studies for open-source terrorism information collection, analysis, and visualization. Using a web spidering approach, we have developed a large-scale, longitudinal collection of extremist-generated Internet-based multimedia and multilingual contents. We have also developed selected computational link analysis, content analysis, and authorship analysis techniques to analyze the Dark Web collection.