Abstract
The field of Intelligence and security informatics (ISI) is resulted from the integration and development of advanced information technologies, systems, algorithms, and databases for international, national, and homeland security-related applications, through an integrated technological, organizational, and policy-based approach. Traditionally, ISI research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection, and emergency responses for security informatics. Recent years, with the continuous advance of related technologies and the increasing sophistication of national and international security, new directions in ISI research and applications have emerged that address the research challenges with advanced technologies, especially the advancements in social computing. This is the focus of discussion in the current chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Charikar, M., Chekuri, C., yat Cheung, T., Dai, Z., Goel, A., Guha, S., Li, M.: Approximation algorithms for directed steiner problems. In: Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 192–200 (1998)
Chen, H., Wang, F.Y., Zeng, D.: Intelligence and security informatics for homeland security: information, communication, and transportation. IEEE Trans. Intell. Transp. Syst. 5(4), 329–341 (2004)
Fikes, R.E., Nilsson, N.J.: Strips: a new approach to the application of theorem proving to problem solving. Artif. Intell. 2(3), 189–208 (1971)
Girju, R.: Automatic detection of causal relations for question answering. In: Proceedings of the ACL 2003 Workshop on Multilingual Summarization and Question Answering, pp. 76–83 (2003)
Huber, M.J., Durfee, E.H., Wellman, M.P.: The automated mapping of plans for plan recognition. In: Proceedings of the Tenth International Conference on Uncertainty in Artificial Intelligence, pp. 344–351 (1994)
Khoo, C.S.G., Chan, S., Niu, Y.: Extracting causal knowledge from a medical database using graphical patterns. In: Proceedings of the 38th Annual Meeting on Association for Computational Linguistics, pp. 336–343 (2000)
Li, X., Mao, W., Zeng, D., Wang, F.Y.: Automatic construction of domain theory for attack planning. In: IEEE International Conference on Intelligence and Security Informatics, pp. 65–70 (2010)
Persing, I., Ng, V.: Semi-supervised cause identification from aviation safety reports. In: Proceedings of the Joint Conference of the 47th Annual Meeting on Association for Computational Linguistics, pp. 843–851 (2009)
Sil, A., Huang, F., Yates, A.: Extracting action and event semantics from web text. In: AAAI Fall Symposium on Common-Sense Knowledge, vol. 40 (2010)
Wang, F.Y.: Computational experiments for behavior analysis and decision evaluation of complex systems. Acta Simulata Systematica Sinica 5, 008 (2004)
Wang, F.Y.: Social computing: concepts, contents, and methods. Int. J. Intell. Control Syst. 9(2), 91–96 (2004)
Wang, F.Y.: A computational framework for decision analysis and support in isi: Artificial societies, computational experiments, and parallel systems. In: Intelligence and Security Informatics, pp. 183–184. Springer, Berlin (2006)
Wang, F.Y.: Parallel management systems: concepts and methods. J Complex Syst. Complex. Sci. 3(2), 26–32 (2006)
Wang, F.Y.: Toward a paradigm shift in social computing: the acp approach. IEEE Intell. Syst. 22(5), 65–67 (2007)
Zosin, L., Khuller, S.: On directed steiner trees. In: Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 59–63 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wang, FY., Li, X., Mao, W. (2015). An ACP-Based Approach to Intelligence and Security Informatics. In: Yager, R., Reformat, M., Alajlan, N. (eds) Intelligent Methods for Cyber Warfare. Studies in Computational Intelligence, vol 563. Springer, Cham. https://doi.org/10.1007/978-3-319-08624-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-08624-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08623-1
Online ISBN: 978-3-319-08624-8
eBook Packages: EngineeringEngineering (R0)