↓ Skip to main content

Intelligence and Security Informatics

Overview of attention for book
Cover of 'Intelligence and Security Informatics'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Collusion Set Detection Through Outlier Discovery
  3. Altmetric Badge
    Chapter 2 Digging in the Details: A Case Study in Network Data Mining
  4. Altmetric Badge
    Chapter 3 Efficient Identification of Overlapping Communities
  5. Altmetric Badge
    Chapter 4 Event-Driven Document Selection for Terrorism Information Extraction
  6. Altmetric Badge
    Chapter 5 Link Analysis Tools for Intelligence and Counterterrorism
  7. Altmetric Badge
    Chapter 6 Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature
  8. Altmetric Badge
    Chapter 7 Private Mining of Association Rules
  9. Altmetric Badge
    Chapter 8 Design Principles of Coordinated Multi-incident Emergency Response Systems
  10. Altmetric Badge
    Chapter 9 Multi-modal Biometrics with PKI Technologies for Border Control Applications
  11. Altmetric Badge
    Chapter 10 Risk Management Using Behavior Based Bayesian Networks
  12. Altmetric Badge
    Chapter 11 Sensitivity Analysis of an Attack Containment Model
  13. Altmetric Badge
    Chapter 12 Toward a Target-Specific Method of Threat Assessment
  14. Altmetric Badge
    Chapter 13 Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts
  15. Altmetric Badge
    Chapter 14 Integrating Private Databases for Data Analysis
  16. Altmetric Badge
    Chapter 15 Applying Authorship Analysis to Arabic Web Content
  17. Altmetric Badge
    Chapter 16 Automatic Extraction of Deceptive Behavioral Cues from Video
  18. Altmetric Badge
    Chapter 17 Automatically Determining an Anonymous Author’s Native Language
  19. Altmetric Badge
    Chapter 18 A Cognitive Model for Alert Correlation in a Distributed Environment
  20. Altmetric Badge
    Chapter 19 Beyond Keyword Filtering for Message and Conversation Detection
  21. Altmetric Badge
    Chapter 20 Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)
  22. Altmetric Badge
    Chapter 21 Modeling and Multiway Analysis of Chatroom Tensors
  23. Altmetric Badge
    Chapter 22 Selective Fusion for Speaker Verification in Surveillance
  24. Altmetric Badge
    Chapter 23 A New Conceptual Framework to Resolve Terrorism’s Root Causes
  25. Altmetric Badge
    Chapter 24 Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network
  26. Altmetric Badge
    Chapter 25 A Conceptual Model of Counterterrorist Operations
  27. Altmetric Badge
    Chapter 26 Measuring Success in Countering Terrorism: Problems and Pitfalls
  28. Altmetric Badge
    Chapter 27 Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis
  29. Altmetric Badge
    Chapter 28 Testing a Rational Choice Model of Airline Hijackings
  30. Altmetric Badge
    Chapter 29 Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms
  31. Altmetric Badge
    Chapter 30 Discovering Identity Problems: A Case Study
  32. Altmetric Badge
    Chapter 31 Efficient Discovery of New Information in Large Text Databases
  33. Altmetric Badge
    Chapter 32 Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
  34. Altmetric Badge
    Chapter 33 LSI-Based Taxonomy Generation: The Taxonomist System
  35. Altmetric Badge
    Chapter 34 Some Marginal Learning Algorithms for Unsupervised Problems
  36. Altmetric Badge
    Chapter 35 Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
  37. Altmetric Badge
    Chapter 36 Evaluating an Infectious Disease Information Sharing and Analysis System
  38. Altmetric Badge
    Chapter 37 How Question Answering Technology Helps to Locate Malevolent Online Content
  39. Altmetric Badge
    Chapter 38 Information Supply Chain: A Unified Framework for Information-Sharing
  40. Altmetric Badge
    Chapter 39 Map-Mediated GeoCollaborative Crisis Management
  41. Altmetric Badge
    Chapter 40 Thematic Indicators Derived from World News Reports
  42. Altmetric Badge
    Chapter 41 A Novel Watermarking Algorithm Based on SVD and Zernike Moments
  43. Altmetric Badge
    Chapter 42 A Survey of Software Watermarking
  44. Altmetric Badge
    Chapter 43 Data Distortion for Privacy Protection in a Terrorist Analysis System
  45. Altmetric Badge
    Chapter 44 Deception Across Cultures: Bottom-Up and Top-Down Approaches
  46. Altmetric Badge
    Chapter 45 Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling
  47. Altmetric Badge
    Chapter 46 Active Automation of the DITSCAP
  48. Altmetric Badge
    Chapter 47 An Ontological Approach to the Document Access Problem of Insider Threat
  49. Altmetric Badge
    Chapter 48 Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall
  50. Altmetric Badge
    Chapter 49 Intrusion Detection System Using Sequence and Set Preserving Metric
  51. Altmetric Badge
    Chapter 50 The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level
  52. Altmetric Badge
    Chapter 51 Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation
  53. Altmetric Badge
    Chapter 52 A Jackson Network-Based Model for Quantitative Analysis of Network Security
  54. Altmetric Badge
    Chapter 53 Biomonitoring, Phylogenetics and Anomaly Aggregation Systems
  55. Altmetric Badge
    Chapter 54 CODESSEAL: Compiler/FPGA Approach to Secure Applications
  56. Altmetric Badge
    Chapter 55 Computational Tool in Infrastructure Emergency Total Evacuation Analysis
  57. Altmetric Badge
    Chapter 56 Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
  58. Altmetric Badge
    Chapter 57 A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems
  59. Altmetric Badge
    Chapter 58 Connections in the World of International Terrorism
  60. Altmetric Badge
    Chapter 59 Forecasting Terrorism: Indicators and Proven Analytic Techniques
  61. Altmetric Badge
    Chapter 60 Forecasting Terrorist Groups’ Warfare: ‘Conventional’ to CBRN
  62. Altmetric Badge
    Chapter 61 The Qualitative Challenge of Insurgency Informatics
  63. Altmetric Badge
    Chapter 62 The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events
  64. Altmetric Badge
    Chapter 63 A Group Decision-Support Method for Search and Rescue Based on Markov Chain
  65. Altmetric Badge
    Chapter 64 A New Relationship Form in Data Mining
  66. Altmetric Badge
    Chapter 65 A Study of ”Root Causes of Conflict” Using Latent Semantic Analysis
  67. Altmetric Badge
    Chapter 66 An Empirical Study on Dynamic Effects on Deception Detection
  68. Altmetric Badge
    Chapter 67 Anti Money Laundering Reporting and Investigation – Sorting the Wheat from the Chaff
  69. Altmetric Badge
    Chapter 68 Application of Latent Semantic Indexing to Processing of Noisy Text
  70. Altmetric Badge
    Chapter 69 Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques
  71. Altmetric Badge
    Chapter 70 Mining Schemas in Semistructured Data Using Fuzzy Decision Trees
  72. Altmetric Badge
    Chapter 71 More Than a Summary: Stance-Shift Analysis
  73. Altmetric Badge
    Chapter 72 Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots
  74. Altmetric Badge
    Chapter 73 BioPortal: Sharing and Analyzing Infectious Disease Information
  75. Altmetric Badge
    Chapter 74 DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information
  76. Altmetric Badge
    Chapter 75 Processing High-Speed Intelligence Feeds in Real-Time
  77. Altmetric Badge
    Chapter 76 Question Answer TARA: A Terrorism Activity Resource Application
  78. Altmetric Badge
    Chapter 77 Template Based Semantic Similarity for Security Applications
  79. Altmetric Badge
    Chapter 78 The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web
  80. Altmetric Badge
    Chapter 79 Toward an ITS Specific Knowledge Engine
  81. Altmetric Badge
    Chapter 80 A Blind Image Watermarking Using for Copyright Protection and Tracing
  82. Altmetric Badge
    Chapter 81 Towards an Effective Wireless Security Policy for Sensitive Organizations
  83. Altmetric Badge
    Chapter 82 A Taxonomy of Cyber Attacks on 3G Networks
  84. Altmetric Badge
    Chapter 83 An Adaptive Approach to Handle DoS Attack for Web Services
  85. Altmetric Badge
    Chapter 84 An Architecture for Network Security Using Feedback Control
  86. Altmetric Badge
    Chapter 85 Defending a Web Browser Against Spying with Browser Helper Objects
  87. Altmetric Badge
    Chapter 86 Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet
  88. Altmetric Badge
    Chapter 87 Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel
  89. Altmetric Badge
    Chapter 88 Gathering Digital Evidence in Response to Information Security Incidents
  90. Altmetric Badge
    Chapter 89 On the QP Algorithm in Software Watermarking
  91. Altmetric Badge
    Chapter 90 On the Use of Opaque Predicates in Mobile Agent Code Obfuscation
  92. Altmetric Badge
    Chapter 91 Secure Contents Distribution Using Flash Memory Technology
  93. Altmetric Badge
    Chapter 92 Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities
  94. Altmetric Badge
    Chapter 93 Securing Grid-Based Critical Infrastructures
  95. Altmetric Badge
    Chapter 94 The Safety Alliance of Cushing – A Model Example of Cooperation as an Effective Counterterrorism Tool
  96. Altmetric Badge
    Chapter 95 A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques
  97. Altmetric Badge
    Chapter 96 An Agent-Based Framework for a Traffic Security Management System
  98. Altmetric Badge
    Chapter 97 Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle
  99. Altmetric Badge
    Chapter 98 Application of Cooperative Co-evolution in Pedestrian Detection Systems
  100. Altmetric Badge
    Chapter 99 Biometric Fingerprints Based Radio Frequency Identification
  101. Altmetric Badge
    Chapter 100 BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization
Attention for Chapter 6: Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature
Altmetric Badge

Citations

dimensions_citation
13 Dimensions

Readers on

mendeley
14 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature
Chapter number 6
Book title
Intelligence and Security Informatics
Published by
Springer, Berlin, Heidelberg, May 2005
DOI 10.1007/11427995_6
Book ISBNs
978-3-54-025999-2, 978-3-54-032063-0
Authors

Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael Atwood

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 14 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 14 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 29%
Other 2 14%
Professor 2 14%
Student > Bachelor 1 7%
Student > Doctoral Student 1 7%
Other 1 7%
Unknown 3 21%
Readers by discipline Count As %
Computer Science 8 57%
Agricultural and Biological Sciences 1 7%
Nursing and Health Professions 1 7%
Medicine and Dentistry 1 7%
Engineering 1 7%
Other 0 0%
Unknown 2 14%