메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Modeling and detection techniques for counter-terror social network analysis and intent recognition

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHM DEVELOPMENT; ATTACK SCENARIOS; AUTOMATED INFORMATION; AUTOMATED TECHNIQUES; AUTOMATED TOOLS; BACKGROUND CLUTTER; BACKGROUND TRAFFIC; DESCRIPTION LANGUAGES; DETECTION AND TRACKING; DETECTION TECHNIQUE; EDITING TOOLS; INFORMATION EXTRACTION; INTENT RECOGNITION; JAKARTA; MODELING AND SIMULATION; MULTIMEDIA DATA; POTENTIAL ATTACK; PROBABILITY OF DETECTION; PROBABILITY OF FALSE ALARM; RANDOM NETWORK; REAL-WORLD; SOCIAL NETWORK ANALYSIS; SOCIAL NETWORKS; SUBJECT MATTER EXPERTS; SUPPORT VECTOR MACHINE TECHNIQUES; TERROR ATTACKS; TERRORIST ATTACKS; TERRORIST GROUPS; TERRORIST NETWORKS; WORK FOCUS;

EID: 70349109266     PISSN: 1095323X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AERO.2009.4839642     Document Type: Conference Paper
Times cited : (38)

References (30)
  • 1
    • 11244253079 scopus 로고    scopus 로고
    • Detecting, Tracking and Counteracting Terrorist Networks via Hidden Markov Models
    • Allanach 2004, Big Sky, MT, March
    • [Allanach 2004] J. Allanach, H. Tu, S. Singh, K. Pattipati and P. Willett, "Detecting, Tracking and Counteracting Terrorist Networks via Hidden Markov Models," IEEE Aerospace Conference, Big Sky, MT, March 2004.
    • (2004) IEEE Aerospace Conference
    • Allanach, J.1    Tu, H.2    Singh, S.3    Pattipati, K.4    Willett, P.5
  • 2
    • 26944464961 scopus 로고    scopus 로고
    • Generating artificial corpora for plan recognition
    • Blaylock05, Liliana Ardissono, Paul Brna, and Antonija Mitrovic, editors, User Modeling, number in, Springer, Edinburgh, July 24-29
    • [Blaylock05] N. Blaylock and James Allen, "Generating artificial corpora for plan recognition," in Liliana Ardissono, Paul Brna, and Antonija Mitrovic, editors, User Modeling 2005, number 3538 in Lecture Notes in Artificial Intelligence, pages 179-188. Springer, Edinburgh, July 24-29 2005.
    • (2005) Lecture Notes in Artificial Intelligence , vol.3538 , pp. 179-188
    • Blaylock, N.1    Allen, J.2
  • 3
    • 0032632354 scopus 로고    scopus 로고
    • An algorithm that learns what's in a name
    • Bikel 1999
    • [Bikel 1999] D. M. Bikel, R. L. Schwartz, and R. M. Weischedel. 1999. An algorithm that learns what's in a name. Machine Learning, vol. 34, no. 1-3.
    • (1999) Machine Learning , vol.34 , Issue.1-3
    • Bikel, D.M.1    Schwartz, R.L.2    Weischedel, R.M.3
  • 7
    • 70349087604 scopus 로고    scopus 로고
    • [Carley 2007] Carley, Kathleen. Destabilizing Terrorist Networks, Proceedings of the 8th International Command and Control Research and Technology Symposium, conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication.
    • [Carley 2007] Carley, Kathleen. "Destabilizing Terrorist Networks, "Proceedings of the 8th International Command and Control Research and Technology Symposium, conference held at the National Defense War College, Washington DC. Evidence Based Research, Track 3, Electronic Publication.
  • 8
    • 58249091502 scopus 로고    scopus 로고
    • ORA User's Guide 2008. Carnegie Mellon University, School of Computer Science, Institute for Software Research
    • Carley 2008, Technical Report CMU-ISR-08-125
    • [Carley 2008] Carley, Kathleen & Columbus, Dave & DeReno, Matt & Reminga, Jeffrey & Moon, Il-Chul. (2008). ORA User's Guide 2008. Carnegie Mellon University, School of Computer Science, Institute for Software Research, Technical Report CMU-ISR-08-125
    • (2008)
    • Carley, K.1    Columbus, D.2    DeReno, M.3    Reminga, J.4    Moon, I.-C.5
  • 9
    • 70349128029 scopus 로고    scopus 로고
    • [Chakrabarti 2004] D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-mat: A recursive model for graph mining. In SDM, 2004.
    • [Chakrabarti 2004] D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-mat: A recursive model for graph mining. In SDM, 2004.
  • 10
    • 11244303741 scopus 로고    scopus 로고
    • Dynamic Classification of Groups Through Social Network Analysis and HMMs
    • Coffman 2004
    • [Coffman 2004] Thayne R. Coffman, Sherry E. Marcus, Dynamic Classification of Groups Through Social Network Analysis and HMMs, 2004 IEEE Aerospace Conference Proceedings.
    • (2004) IEEE Aerospace Conference Proceedings
    • Coffman, T.R.1    Marcus, S.E.2
  • 13
    • 70349132539 scopus 로고    scopus 로고
    • [Diesner 2005] Diesner, Jana & Carley, Kathleen. (2005). Exploration of Communication Networks from the Enron Email Corpus. Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005, pp. 3-14. Newport Beach, CA, April 21-23, 2005., 3-14.
    • [Diesner 2005] Diesner, Jana & Carley, Kathleen. (2005). Exploration of Communication Networks from the Enron Email Corpus. Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM International Conference on Data Mining 2005, pp. 3-14. Newport Beach, CA, April 21-23, 2005., 3-14.
  • 18
    • 70349143722 scopus 로고    scopus 로고
    • [Jakarta 2004 Wikipedia], 2004 Australian Embassy Bombing,http://en.wikipedia.org/wiki/2004-Australian-embassy-bombing.
    • [Jakarta 2004 Wikipedia], "2004 Australian Embassy Bombing,"http://en.wikipedia.org/wiki/2004-Australian-embassy-bombing. "
  • 19
    • 70349122907 scopus 로고    scopus 로고
    • November 2007
    • [Jensen 2007] Proximity 4.3 QGraph Guide, November 2007, http://kdl.cs.umass.edu/proximity/documentation/QGraphGuide.pdf.
    • (2007) Proximity 4.3 QGraph Guide
    • Jensen1
  • 20
    • 33749014952 scopus 로고    scopus 로고
    • Nine Cautionary Tales
    • Kumagi06] J. Kumagi, ed, Sept
    • [Kumagi06] J. Kumagi, ed., "Nine Cautionary Tales," IEEE Spectrum, Sept. 2006, pp. 36-45.
    • (2006) IEEE Spectrum , pp. 36-45
  • 21
    • 38049146447 scopus 로고    scopus 로고
    • [McCallum 2007] Joint Group and Topic Discovery from Relations and Text. Andrew McCallum, Xuerui Wang and Natasha Mohanty, Statistical Network Analysis: Models, Issues and New Directions, Lecture Notes in Computer Science 4503, pp. 28-44, (Book chapter), 2007
    • [McCallum 2007] Joint Group and Topic Discovery from Relations and Text. Andrew McCallum, Xuerui Wang and Natasha Mohanty, Statistical Network Analysis: Models, Issues and New Directions, Lecture Notes in Computer Science 4503, pp. 28-44, (Book chapter), 2007
  • 22
    • 33947664999 scopus 로고    scopus 로고
    • Relational Dependency Networks
    • Neville 2007, March
    • [Neville 2007] Neville, J. and D. Jensen, Relational Dependency Networks. Journal of Machine Learning Research. 8 (March, 2007): 653-692. http://jmlr.csail.mit.edu/papers/volume8/neville07a/neville07a.pdf
    • (2007) Journal of Machine Learning Research , vol.8 , pp. 653-692
    • Neville, J.1    Jensen, D.2
  • 23
    • 33745012299 scopus 로고    scopus 로고
    • Modularity and community structure in networks
    • Newman 2006
    • [Newman 2006] M. E. J. Newman (2006). "Modularity and community structure in networks". Proc. Natl. Acad. Sci. USA 103: 8577-8582
    • (2006) Proc. Natl. Acad. Sci. USA , vol.103 , pp. 8577-8582
    • Newman, M.E.J.1
  • 24
    • 70349118935 scopus 로고    scopus 로고
    • Automatic Content Extraction
    • [NIST08] "Automatic Content Extraction: 2008 Evaluation Plan," http://www.nist.gov/speech/tests/ace.
    • (2008) Evaluation Plan
  • 26
    • 70349102400 scopus 로고    scopus 로고
    • [Popp 2006] R. Popp and J. Yen (editors): Emergent Information Technologies and Enabling Policies for Counter-Terrorism (in this comprehensive reference see especially chapter 2, Hidden Markov Models and Bayesian Networks for Counter-Terrorism by K. Pattipati, et. al.), IEEE Press, 2006
    • [Popp 2006] R. Popp and J. Yen (editors): Emergent Information Technologies and Enabling Policies for Counter-Terrorism (in this comprehensive reference see especially chapter 2, Hidden Markov Models and Bayesian Networks for Counter-Terrorism by K. Pattipati, et. al.), IEEE Press, 2006
  • 28
    • 84889371790 scopus 로고    scopus 로고
    • Pattipati 2006, R. Popp and J. Yen (editors) Emergent Information Technologies and Enabling Policies for Counter Terrorism, Wiley-IEEE Press, May
    • [Pattipati 2006] K. R. Pattipati, P.K. Willett, J. Allanach, H. Tu and S. Singh, "Hidden Markov Models and Bayesian Networks for Counter-terrorism," R. Popp and J. Yen (editors) Emergent Information Technologies and Enabling Policies for Counter Terrorism, Wiley-IEEE Press, May 2006, pp. 27-50.
    • (2006) Hidden Markov Models and Bayesian Networks for Counter-terrorism , pp. 27-50
    • Pattipati, K.R.1    Willett, P.K.2    Allanach, J.3    Tu, H.4    Singh, S.5
  • 29
    • 46649106463 scopus 로고    scopus 로고
    • Games and Terrorism: Recent Developments
    • Sandler08, Sep
    • [Sandler08] Todd Sandler and Kevin Siqueira, "Games and Terrorism: Recent Developments," Simulation & Gaming, Sep 2003; vol. 34: pp. 319-337.
    • (2003) Simulation & Gaming , vol.34 , pp. 319-337
    • Sandler, T.1    Siqueira, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.