Evolving data into mining solutions for insights
Communications of the ACM - Evolving data mining into solutions for insights
Social, ethical and legal issues of data mining
Data mining
Automatically detecting deceptive criminal identities
Communications of the ACM - Homeland security
Understanding Terror Networks
Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Operations Research/Computer Science Interfaces)
Intelligence and Security Informatics for International Security: Information Sharing and Data Mining (Integrated Series in Information Systems)
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Evacuation planning: a capacity constrained routing approach
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
ITSC 05: Current Issues and Research Trends
IEEE Intelligent Systems
Social Computing: From Social Informatics to Social Intelligence
IEEE Intelligent Systems
Relational peculiarity-oriented mining
Data Mining and Knowledge Discovery
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
CWME: a framework of group support system for emergency responses
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hidden markov model based intrusion detection
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
One-Class strategies for security information detection
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Cyberspace community analysis and simulation using complex dynamic social networks
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Analysis of infectious disease data based on evolutionary computation
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Rule+Exception learning-based class specification and labeling in intelligence and security analysis
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues
ACM Transactions on Management Information Systems (TMIS)
Hi-index | 0.01 |
In the post-9/11 world, information technology is an indispensable part of making our nation safer. Critical national security missions in the context of various data and technical domain challenges could benefit from establishing an intelligence and security informatics research discipline. Just as biomedical informatics addresses information management issues in biological and medical applications, ISI would address such issues for intelligence and security applications.The knowledge discovery from databases methodology shows promise in addressing unique ISI challenges. KDD has already proved successful in other information-intensive, knowledge-critical domains including business, engineering, biology, and medicine.This article is part of a special issue on Homeland Security.