New Advances in Intelligence and Security Informatics
By Wenji Mao and FeiYue Wang
()
About this ebook
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications.
Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. This book provides a comprehensive and interdisciplinary account of the new advances in ISI area along three fundamental dimensions: methodological issues in security informatics; new technological developments to support security-related modeling, detection, analysis and prediction; and applications and integration in interdisciplinary socio-cultural fields.
- Identifies emerging directions in ISI research and applications that address the research challenges with advanced technologies
- Provides an integrated account of the new advances in ISI field in three core aspects: methodology, technological developments and applications
- Benefits researchers as well as security professionals who are involved in cutting-edge research and applications in security informatics and related fields
Related to New Advances in Intelligence and Security Informatics
Related ebooks
Intelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsOSINT in the Intelligence Era: Lecture notes Rating: 0 out of 5 stars0 ratingsAutomating Open Source Intelligence: Algorithms for OSINT Rating: 5 out of 5 stars5/5Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage Rating: 5 out of 5 stars5/5Introduction to Cyber-Warfare: A Multidisciplinary Approach Rating: 5 out of 5 stars5/5Information Security Science: Measuring the Vulnerability to Data Compromises Rating: 0 out of 5 stars0 ratingsCybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats Rating: 3 out of 5 stars3/5Cyber Crime and Cyber Terrorism Investigator's Handbook Rating: 4 out of 5 stars4/5Cyber Influence and Cognitive Threats Rating: 0 out of 5 stars0 ratingsThreat Intelligence A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThreat Intelligence Platform Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsVulnerability Management A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCompetitive Intelligence Analyst A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCyber Warfare: Its Implications on National Security Rating: 0 out of 5 stars0 ratingsAmerica's Strategic Blunders: Intelligence Analysis and National Security Policy, 1936–1991 Rating: 0 out of 5 stars0 ratingsIntelligence Analysis A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsOpen-source intelligence Second Edition Rating: 0 out of 5 stars0 ratingsIntelligence Gathering Network A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsVulnerability And Patch Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsEffective Intelligence In Urban Environments Rating: 0 out of 5 stars0 ratingsIntelligence Analyst A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsThreat Intelligence Feeds Third Edition Rating: 0 out of 5 stars0 ratingsCyber Guerilla Rating: 0 out of 5 stars0 ratingsCounter Intelligence A Complete Guide - 2020 Edition Rating: 1 out of 5 stars1/5Cognitive traps for intelligence analysis The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsThe Grey Line: Modern Corporate Espionage and Counter Intelligence Rating: 0 out of 5 stars0 ratingsThreat Intelligence Platforms A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsCyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Rating: 0 out of 5 stars0 ratingsHuman Intelligence Collector Operations Rating: 0 out of 5 stars0 ratings
Electrical Engineering & Electronics For You
The Fast Track to Your Technician Class Ham Radio License: For Exams July 1, 2022 - June 30, 2026 Rating: 5 out of 5 stars5/5No Nonsense Technician Class License Study Guide: for Tests Given Between July 2018 and June 2022 Rating: 5 out of 5 stars5/5Electricity for Beginners Rating: 5 out of 5 stars5/5How to Diagnose and Fix Everything Electronic, Second Edition Rating: 4 out of 5 stars4/5Electrician's Pocket Manual Rating: 0 out of 5 stars0 ratingsThe Homeowner's DIY Guide to Electrical Wiring Rating: 5 out of 5 stars5/5Basic Electricity Rating: 4 out of 5 stars4/5Electrician's Calculations Manual, Second Edition Rating: 0 out of 5 stars0 ratingsPractical Electrical Wiring: Residential, Farm, Commercial, and Industrial Rating: 4 out of 5 stars4/5DIY Lithium Battery Rating: 3 out of 5 stars3/5Solar & 12 Volt Power For Beginners Rating: 4 out of 5 stars4/5Electrical Engineering 101: Everything You Should Have Learned in School...but Probably Didn't Rating: 5 out of 5 stars5/5Beginner's Guide to Reading Schematics, Third Edition Rating: 0 out of 5 stars0 ratingsDIY Drones for the Evil Genius: Design, Build, and Customize Your Own Drones Rating: 4 out of 5 stars4/5Upcycled Technology: Clever Projects You Can Do With Your Discarded Tech (Tech gift) Rating: 5 out of 5 stars5/5Beginner's Guide to Reading Schematics, Fourth Edition Rating: 4 out of 5 stars4/5Raspberry Pi Projects for the Evil Genius Rating: 0 out of 5 stars0 ratings15 Dangerously Mad Projects for the Evil Genius Rating: 4 out of 5 stars4/5Off-Grid Projects: Step-by-Step Guide to Building Your Own Off-Grid System Rating: 0 out of 5 stars0 ratingsVery Truly Yours, Nikola Tesla Rating: 5 out of 5 stars5/5Electric Circuits Essentials Rating: 5 out of 5 stars5/5Schaum's Outline of Basic Electricity, Second Edition Rating: 5 out of 5 stars5/5How Do Electric Motors Work? Physics Books for Kids | Children's Physics Books Rating: 0 out of 5 stars0 ratingsTwo-Stroke Engine Repair and Maintenance Rating: 0 out of 5 stars0 ratingsElectroculture - The Application of Electricity to Seeds in Vegetable Growing Rating: 0 out of 5 stars0 ratingsProgramming Arduino: Getting Started with Sketches Rating: 4 out of 5 stars4/5Mims Circuit Scrapbook V.I. Rating: 5 out of 5 stars5/5Electronic Circuits for the Evil Genius 2/E Rating: 0 out of 5 stars0 ratingsTHE Amateur Radio Dictionary: The Most Complete Glossary of Ham Radio Terms Ever Compiled Rating: 4 out of 5 stars4/5
Reviews for New Advances in Intelligence and Security Informatics
0 ratings0 reviews
Book preview
New Advances in Intelligence and Security Informatics - Wenji Mao
Index
Chapter 1
Intelligence and Security Informatics Research Frameworks
Intelligence and security informatics (ISI) is defined as the development of advanced information technologies, systems, algorithms, and databases for international, national, and homeland security-related applications, through an integrated technological, organizational, and policy-based approach [1]. Traditionally, ISI research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection, and emergency responses for security informatics.
With the continuous advance of information technologies and the increasing sophistication of national and international security, in recent years new directions in ISI research and applications have emerged that address the research challenges with advanced technologies. To meet the challenges and achieve a methodology shift in ISI research and applications, we propose a social computing-based research paradigm consisting of a three-stage modeling, analysis, and control approach that researchers have used successfully to solve many natural and engineering science problems.
1.1 Research Methodology and Frameworks for ISI
In the past few years, ISI has experienced tremendous growth and made significant progress in academic research and practice involving both government agencies and industry. There have been a number of research methods and frameworks proposed to support intelligence and security informatics-related studies.
The Dark Web project developed one of the best-known ISI research frameworks. The project has for several years collected a wide variety of data relating to, and emanating from, extremist and terrorist groups. These data have included websites, multimedia material linked to the websites, forums, blogs, virtual world implementations, etc. The early system design contained three modules: data acquisition, data preparation, and system functionality. To further support its potential use as an open-source intelligence tool, several improvements in system functionality were later made [2].
New advances in ISI have emerged in recent years, especially the advancements in social-cultural computing. Subrahmanian [3] argues that cultural, economic, political, and religious factors can help policymakers predict the behavior of radical groups and proposes a cultural reasoning framework, CARA (Cognitive Architecture for Reasoning about Adversaries) [4]. CARA is comprised of four components, namely a Semantic Web extraction engine to elicit organization data, an opinion-mining engine that captures the group's opinions, an algorithm to correlate culturally relevant variables with the actions the organization takes, and a simulation environment within which analysts and users can experiment on hypothetical situations. When a new event occurs, CARA can forecast the k most probable sets of actions the group might take in a few minutes. To further develop CARA, several algorithms have been proposed to forecast the behavior of radical groups [5, 6].
Social computing refers to the computational facilitation of social studies and human social dynamics, as well as the design and use of information and communication technologies that consider the social context. As a new paradigm of computing and technology development, social computing can help us understand and analyze individual and organizational behavior and facilitate ISI research and applications in many aspects. To meet the challenges and achieve a methodology shift in ISI research and applications, we propose a social computing-based research paradigm called the ACP approach. Below, we introduce the three major components of ACP—namely, artificial societies for modeling (A), computational experiments for analysis (C), and parallel execution for control (P)—and discuss the philosophical and physical foundations of the ACP approach.
1.2 The ACP Approach
To achieve a paradigm shift in ISI research and applications, we propose adapting the three-stage modeling, analysis, and control approach that researchers have used successfully to solve many natural and engineering science problems [7, 8]. In this section, we describe what we call the ACP approach [8–12]: artificial societies for modeling, computational experiments for analysis, and parallel execution for control.
1.2.1 Modeling with Artificial Societies
There are as yet no effective, widely accepted methods for modeling complex systems, especially those involving human behavior and social organizations. Agent-based artificial societies or general artificial systems may be the most promising approach.
Modeling with artificial societies has three main parts: agents, environments, and rules for interactions. In this modeling approach, the accuracy of approximation to real systems is no longer the only objective, as it is in traditional computer simulations. Instead, the model society represented by an artificial system is considered real—an alternative possible realization of the target society. Along this line of thinking, the real society is also one possible realization. So, the behaviors of two societies, real and artificial, are different but are considered equivalent for evaluation and