Data Mining for Counter-Terrorism

نویسنده

  • Bhavani Thuraisingham
چکیده

Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential solutions that could detect terrorist activities and yet attempt to maintain privacy will be discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scaling Up ILP to Large Examples: Results on Link Discovery for Counter-Terrorism

Inductive Logic Programming (ILP) has been shown to be a viable approach to many problems in multi-relational data mining (e.g. bioinformatics). Link discovery (LD) is an important task in data mining for counter-terrorism and is the focus of DARPA's program on Evidence Extraction and Link Discovery (EELD). Learning patterns for LD is a novel problem in relational data mining that is characteri...

متن کامل

Data mining technology for countering cybercrime A computational intelligence perspective

Cybercrime is any IT-based criminal offense. Because freely accessing to the Internet, cybercriminal entities threaten everyone, everywhere, every day. From remote individuals to the most powerful governments, none is absolutely immune from cybercrime constantly-mutating and devastating operations. Fortunately, there are scientific methods and technological means to counter it. This paper attem...

متن کامل

A Survey on Social Network Analysis for Counter-Terrorism

Terrorist Activities worldwide has approached the evolution of various high-ended methodologies for analyzing terrorist groups and networks. Existing research found that Social Network Analysis (SNA) is one of the most effective and predictive method for countering terrorism in social networks. The study reviewed various SNA measures for predicting the key players/ main actors of terrorist netw...

متن کامل

Name Matching in Law Enforcement and Counter-Terrorism

Name matching is an important task in law enforcement and counter-terrorism. This paper briefly describes the nature of the name-matching task, enumerates typical name-matching applications, explains the technical challenges posed by namematching, and sets forth several important approaches to these technical challenges. 1. THE NAME-MATCHING TASK Name matching is the task of recognizing when tw...

متن کامل

Marshalling Evidence Through Data Mining in Support of Counter Terrorism

In this paper we present an architecture to manage a large, distributed volume of evidence for counterterrorism applications. This approach facilitates the intelligence analyst’s train of thought by enabling hypotheses to be postulated and evaluated against the available evidence. The hypothesis creation is left to the human (as we believe only humans possess the flexibility to adapt hypothesis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003