Chen et al., 2004 - Google Patents
Intelligence and security informatics for homeland security: information, communication, and transportationChen et al., 2004
View PDF- Document ID
- 17485924905985525558
- Author
- Chen H
- Wang F
- Zeng D
- Publication year
- Publication venue
- IEEE Transactions on Intelligent Transportation Systems
External Links
Snippet
Intelligence and security informatics (ISI) is an emerging field of study aimed at developing advanced information technologies, systems, algorithms, and databases for national-and homeland-security-related applications, through an integrated technological, organizational …
- 238000004642 transportation engineering 0 title abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | Intelligence and security informatics for homeland security: information, communication, and transportation | |
Chen et al. | Terrorism informatics: Knowledge management and data mining for homeland security | |
Mena | Machine learning forensics for law enforcement, security, and intelligence | |
DeRosa | Data mining and data analysis for counterterrorism | |
Weitzner et al. | Transparent accountable data mining: New strategies for privacy protection | |
Ball | Automating social network analysis: A power tool for counter-terrorism | |
Dorff | Violent and nonviolent resistance in contexts of prolonged crisis: The civilian perspective | |
Andrews et al. | Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online | |
Semenov et al. | A generic architecture for a social network monitoring and analysis system | |
Hauck et al. | COPLINK: A case of intelligent analysis and knowledge management | |
Qazi et al. | Associative search through formal concept analysis in criminal intelligence analysis | |
González-Conejero et al. | Organized crime structure modelling for european law enforcement agencies interoperability through ontologies | |
Ho et al. | Using Situational Crime Prevention (SCP)-C3 cycle and common inventory of cybersecurity controls from ISO/IEC 27002: 2022 to prevent cybercrimes | |
Gkoulalas-Divanis et al. | Privacy protection in open information management platforms | |
US20100235314A1 (en) | Method and apparatus for analyzing and interrelating video data | |
Sharma et al. | IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions | |
Ananyan | Crime pattern analysis through text mining | |
Elezaj et al. | Crime intelligence from social media using CISMO | |
Pastor et al. | Scanning of open data for detection of emerging organized crime threats—the ePOOLICE project | |
Chamikara et al. | A crime data analysis framework with geographical information support for intelligence led policing | |
Zeng et al. | West Nile virus and botulism portal: A case study in infectious disease informatics | |
Ferrara et al. | Integrating data sources and network analysis tools to support the fight against organized crime | |
Golbeck et al. | Semantic Web Technologies for Terrorist Network Analysis | |
Jongman | Internet websites and links for (counter-) terrorism research | |
El Jaouhari et al. | CTIoT: A Cyber Threat Intelligence Tool for IoT |