The entity-relationship model—toward a unified view of data
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
IEEE Intelligent Systems
Supervised term weighting for automated text categorization
Proceedings of the 2003 ACM symposium on Applied computing
Graph-based technologies for intelligence analysis
Communications of the ACM - Homeland security
Mining hidden community in heterogeneous social networks
Proceedings of the 3rd international workshop on Link discovery
Hi-index | 0.00 |
Terrorist organizations attain their goals by attacking various targets to jeopardize human lives and intimidate governments. As new terrorist attacks almost always aim to break the mold of old plots, tracing the dynamic behaviors of terrorists becomes crucial to national defense. This paper proposes using active modeling in analyzing unconventional attacks in the design of counterterrorism system. The intelligent terrorism detection system not only detects potential threats by monitoring terrorist networks with identified threat patterns, but also continually integrates new threat features in terrorist behaviors and the varying relationships among terrorists.