Advanced Knowledge Integration In Assessing Terrorist Threats
نویسنده
چکیده
Our goal was to apply advanced knowledge integration tools to large data sets of terrorist-related information as a technical collaboration between NIS-8 and CCS-3. Significant progress was made during this past year, and the tools provided new ways of finding direct and indirect relationships between people, groups, terrorist events, and areas of expertise. Additional work is required before these tools can used by individual analysts, but the work completed within this LDRD shows the strength of using knowledge tools on diverse data sets.
منابع مشابه
Proximity and Semi-Metric Analysis of Social Networks Advanced Knowledge Integration In Assessing Terrorist Threats LDRD-DR Network Analysis Component
necessary databases and generating data sets and proximity measures as specified throughout the text.
متن کاملTowards an Operational Semantic Theory of Cyber Defense Against Advanced Persistent Threats
This paper presents current work on developing an operational semantic theory of cyber defense against advanced persistent threats (APTs), which is grounded in cyber threat analytics, science of evidence, knowledge engineering, and machine learning. After introducing advanced persistent threats, it overviews a systematic APT detection framework and the corresponding APT detection models, the fo...
متن کاملIntelligent High-Security Access Control
Access control is an important security issue in particular because of terrorist threats. Access points are increasingly becoming equipped with advanced input sensors often based on biometrics, and with advanced intelligent methods that learn from experience. We have designed a flexible modular system based on integration of arbitrary access sensors and an arbitrary number of stand-alone module...
متن کاملProtecting the Food Supply Chain from Terrorist Attack
The food supply chain is a critical infrastructure that is an attractive target for terrorist attacks. Despite its importance, relatively little research has focused on improving the security of the food supply chain infrastructure. This is largely due to a lack of awareness on the part of food supply chain stakeholders and authorities about the threats. This paper describes a methodology for a...
متن کاملA user-layered approach for modelling and simulating terrorist attacks Abstract Modelling and simulation techniques offer a comprehensive method for assessing the impact of a terrorist attack, allowing multiple scenarios to be simulated with ease without imposing
Modelling and simulation techniques offer a comprehensive method for assessing the impact of a terrorist attack, allowing multiple scenarios to be simulated with ease without imposing extensive time or cost constraints. The aim of this paper is to provide a comprehensive model for the different categories of users who are likely to be involved in the modelling and simulation of a terrorist atta...
متن کامل