首页> 外文会议> >Investigative Data Mining: Identifying Key Nodes in Terrorist Networks
【24h】

Investigative Data Mining: Identifying Key Nodes in Terrorist Networks

机译:调查性数据挖掘:识别恐怖主义网络中的关键节点

获取原文
获取外文期刊封面目录资料

摘要

The concern about national security has increased significantly since the 9/11 attacks. However, information overload and lack of advanced, automated techniques hinders the effective analysis of criminal and terrorist activities. Data mining applied in the context of law enforcement and intelligence analysis, called investigative data mining (IDM), holds the promise of alleviating such problems. In this paper, we present an understanding to show how IDM works and the importance of this approach in identifying key nodes in terrorist networks.
机译:自9/11袭击以来,人们对国家安全的担忧大大增加。但是,信息过多和缺乏先进的自动化技术阻碍了对犯罪和恐怖活动的有效分析。在执法和情报分析的背景下应用的数据挖掘(称为调查数据挖掘(IDM))有望缓解此类问题。在本文中,我们提出了一种理解,以显示IDM的工作方式以及该方法在识别恐怖分子网络中关键节点方面的重要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号