Modern assets in security screening and counter terrorism

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Workshop on Data Mining for Counter Terrorism and Security

Data mining is playing an increasingly important role in sifting through large amount of data for homeland defense applications. However, we must pay attention to the privacy issues while mining the data. This has resulted in the development of several privacy-preserving data mining techniques. The random value distortion technique is one among them. It attempts to hide the sensitive data by ra...

متن کامل

Mapping Information Security Standards: A Counter-Terrorism Example

Although practitioners have mapped the alignment between IT-related standards, this work has rarely been reported in the academic literature. In particular the methods used have not been made explicit, which has limited the value of any reported results. The research described in this paper demonstrates a rigorous method for mapping the alignment between two example IT security standards. The t...

متن کامل

Data Mining for Counter-Terrorism

Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...

متن کامل

Pakistan’s Counter-terrorism strategy and its Implications for domestic, regional and international security

Cette étude porte un regard critique sur la stratégie contre-terroriste du Pakistan adoptée après les attentats du 11 septembre, dans la mesure où elle a été inefficace, voire contre-productive. Elle n’a pu déloger les réseaux terroristes des groups jihadistes et extrémistes basés au Pakistan, qui ont aussi des liens avec al Qaeda. L’évaluation de la stratégie contre-terroriste pakistanaise por...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Vojnotehnicki glasnik

سال: 2019

ISSN: 0042-8469,2217-4753

DOI: 10.5937/vojtehg67-19863