Rule + Exception Strategies for Security Information Analysis
IEEE Intelligent Systems
Distributed Interactive Video Arrays for Event Capture and Enhanced Situational Awareness
IEEE Intelligent Systems
Protecting Transportation Infrastructure
IEEE Intelligent Systems
Modeling and Simulating Terrorist Networks in Social and Geospatial Dimensions
IEEE Intelligent Systems
Toward a Paradigm Shift in Social Computing: The ACP Approach
IEEE Intelligent Systems
A novel data distortion approach via selective SSVD for privacy protection
International Journal of Information and Computer Security
Exploring the analytical processes of intelligence analysts
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Anomaly detection in radiation sensor data with application to transportation security
IEEE Transactions on Intelligent Transportation Systems
A web portal for terrorism activities in China
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Mining high impact exceptional behavior patterns
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Emergency communication and system design: the case of Indian ocean tsunami
ICTD'09 Proceedings of the 3rd international conference on Information and communication technologies and development
How to Track Absolutely Everything
Proceedings of the 2010 conference on Ontologies and Semantic Technologies for Intelligence
IEEE Transactions on Intelligent Transportation Systems
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
CWME: a framework of group support system for emergency responses
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hidden markov model based intrusion detection
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
One-Class strategies for security information detection
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Cyberspace community analysis and simulation using complex dynamic social networks
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Analysis of infectious disease data based on evolutionary computation
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Rule+Exception learning-based class specification and labeling in intelligence and security analysis
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Framework for surveillance of instant messages
International Journal of Internet Technology and Secured Transactions
Application of BW-ELM model on traffic sign recognition
Neurocomputing
Hi-index | 0.00 |
Intelligence and security informatics (ISI) is an emerging field of study aimed at developing advanced information technologies, systems, algorithms, and databases for national- and homeland-security-related applications, through an integrated technological, organizational, and policy-based approach. This paper summarizes the broad application and policy context for this emerging field. Three detailed case studies are presented to illustrate several key ISI research areas, including cross-jurisdiction information sharing; terrorism information collection, analysis, and visualization; and "smart-border" and bioterrorism applications. A specific emphasis of this paper is to note various homeland-security-related applications that have direct relevance to transportation researchers and to advocate security informatics studies that tightly integrate transportation research and information technologies.