Intelligence and Security Informatics

Techniques and Applications

  • Editors
  • Hsinchun Chen
  • Christopher C. Yang

Part of the Studies in Computational Intelligence book series (SCI, volume 135)

Table of contents

  1. Front Matter
  2. Terrorism Informatics and Data Mining

    1. Clive Best, Jakub Piskorski, Bruno Pouliquen, Ralf Steinberger, Hristo Tanev
      Pages 17-43
    2. Jennifer Xu, Hsinchun Chen
      Pages 65-78
    3. Mark Last, Alex Markov, Abraham Kandel
      Pages 79-96
    4. Qi He, Kuiyu Chang, Ee-Peng Lim
      Pages 97-119
    5. Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen
      Pages 121-134
  3. Intelligence and Crime Analysis

    1. Olcay Kursun, Michael Georgiopoulos, Kenneth Reynolds
      Pages 151-172
    2. Yiming Ma, Dawit Yimam Seid, Sharad Mehrotra
      Pages 199-213
    3. Johan Huysmans, Bart Baesens, Jan Vanthienen
      Pages 227-247
  4. Access Control, Infrastructure Protection and Privacy

    1. Jianming He, Wesley W. Chu
      Pages 249-273
    2. Siddharth Kaza, Hsinchun Chen
      Pages 305-318
    3. Endre Boros, Elsayed Elsayed, Paul Kantor, Fred Roberts, Minge Xie
      Pages 319-335
    4. Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
      Pages 337-355
  5. Surveillance and Emergency Response

    1. Xiaolei Li, Jiawei Han, Sangkyum Kim, Hector Gonzalez
      Pages 357-381
    2. Adnan Khashman
      Pages 383-406
    3. Sangho Park, Mohan M. Trivedi
      Pages 407-424
    4. Matthew L. Jensen, Thomas O. Meservy, Judee K. Burgoon, Jay F. Nunamaker Jr.
      Pages 425-441
  6. Back Matter

About this book


Intelligence and Security Informatics (ISI) has become an important research field after the tragic event of September 11, 2001. Researchers in computer and information science have a unique opportunity (and obligation) to contribute to international security via advanced IT research. A series of conferences on ISI has been organized in US since 2003, in Pacific Asia since 2006, and in Europe since 2008. More details about this series of conferences can be found at These activities have brought together researchers, practitioners, and policy-makers to support counterterrorism and homeland security mission. This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research.

The audiences of this book include: (1) public and private sector practitioners in the national/international and homeland security area; (2) consultants and contractors engaging in on-going relationships with federal, state, local, and international agencies on projects related to national security; (3) graduate level students in computer science, information science, public policy, information security, criminology, and terrorism study; and (4) researchers engaging in security informatics, homeland security, information policy, knowledge management, public policy, and counterterrorism research.


access control calculus cognition control data mining filtering information information management intelligence knowledge discovery modeling optimization privacy terrorism visualization

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Engineering Engineering (R0)
  • Print ISBN 978-3-540-69207-2
  • Online ISBN 978-3-540-69209-6
  • Series Print ISSN 1860-949X
  • Series Online ISSN 1860-9503
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Oil, Gas & Geosciences