首页> 外文会议>2012 European Intelligence and Security Informatics Conference >Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks
【24h】

Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks

机译:侦查紧急恐怖主义事件:在信息堆中寻找针

获取原文
获取原文并翻译 | 示例

摘要

Terrorist groups tend to develop unconventional ways to disrupt or destroy economic and critical infrastructures. Examples of unconventional methods include setting up cyberattack cells to disrupt critical infrastructures, using unmonitored financial resources to disrupt or bankrupt national economies, and establishing organizations within countries to desensitize the population to terrorist objectives. Sometimes there are patterns, but most often there are no obvious patterns. This presentation addresses the detection of emergent terrorist events by finding critical pieces of information buried in large volumes of data spanning many disparate data sources.
机译:恐怖组织倾向于以非常规的方式破坏或摧毁经济和关键基础设施。非常规方法的例子包括建立网络攻击小组以破坏关键的基础设施,使用不受监控的财务资源破坏或破产的国民经济,以及在国家内部建立组织以使民众对恐怖主义目标不敏感。有时有模式,但大多数情况下没有明显的模式。本演示文稿通过查找隐藏在跨越许多不同数据源的大量数据中的关键信息来解决紧急恐怖事件的检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号