Workshop on Data Mining for Counter Terrorism and Security
نویسنده
چکیده
Data mining is playing an increasingly important role in sifting through large amount of data for homeland defense applications. However, we must pay attention to the privacy issues while mining the data. This has resulted in the development of several privacy-preserving data mining techniques. The random value distortion technique is one among them. It attempts to hide the sensitive data by randomly modifying the values. This paper questions the utility of the random value distortion technique. The paper develops a random matrix-based spectral filtering technique to retrieve original data from the dataset distorted by adding random values. The proposed method works by comparing the spectrum generated from the observed data with that of random matrices. The paper presents the theoretical foundation and extensive experimental results to demonstrate that the random value distortion technique may not preserve any data privacy after all.
منابع مشابه
James Bond and Global Health Diplomacy
In the 21st Century, distinctions and boundaries between global health, international politics, and the broader interests of the global community are harder to define and enforce than ever before. As a result, global health workers, leaders, and institutions face pressing questions around the nature and extent of their involvement with non-health endeavors, including international conflict reso...
متن کاملPreventing Terrorism by Combating Financial Resources
Terrorism is an offensive action which violates human rights and always invades to people’s rights. Given the high incidence of this type of global action and the widespread violations of human rights and peace and security, countering terrorism will be important. The existence of financial resources is an essential element of terrorism and Preemptive measures and their success in blocking fina...
متن کاملData mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic
There has been much interest on using data mining for counter-terrorism and cyber security applications. For example, data mining can be used to detect unusual patterns, terrorist activities and fraudulent behavior. In addition data mining can also be sued for intrusion detection and malicious code detection. Our current research is focusing extensively on data mining for security applications ...
متن کاملData Mining for Counter-Terrorism
Data mining is becoming a useful tool for detecting and preventing terrorism. This paper first discusses some technical challenges for data mining as applied for counterterrorism applications. Next it provides an overview of the various types of terrorist threats and describes how data mining techniques could provide solutions to counterterrorism. Finally some privacy concerns and potential sol...
متن کاملThe Depoliticisation and ‘ASEANisation’ of Counter-Terrorism Policies in South-East Asia
This article applies a modified version of the theoretical approach of the Copenhagen School to demonstrate that the Association of Southeast Asian Nations (ASEAN) has since 2001 reacted in a twofold way to the complex political obstacles to closer counter-terrorism co-operation: First, it has responded with securitising terrorism as a transnational crime and, second, with a depoliticisation an...
متن کامل