Link Analysis Tools for Intelligence and Counterterrorism

نویسندگان

  • Antonio Badia
  • Mehmed M. Kantardzic
چکیده

Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discover statistically significant patterns (i.e. those with considerable support). We argue that, in law-enforcement, intelligence and counterterrorism work, sometimes it is necessary to look for patterns which do not have large support but are otherwise significant. Here we present some ideas on how to detect potentially interesting links that do not have strong support in a dataset. While deciding what is of interest must ultimately be done by a human analyst, our approach allows filtering some events with interesting characteristics among the many events with low support that may appear in

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigative Data Mining and its Application in Counterterrorism

It is well recognized that advanced filtering and mining in information streams and intelligence bases are of key importance in investigative analysis for countering terrorism and organized crime. As opposed to traditional data mining aiming at extracting knowledge form data, mining for investigative analysis, called Investigative Data Mining (IDM), aims at discovering hidden instances of patte...

متن کامل

Terrorism, Security, and the Threat of Counterterrorism

In America, Britain and Australia the threat of terrorism has been used to justify radical new legislation that gives police and intelligence agencies unprecedented powers to detain and question people believed to have information connected to terrorism. In this paper I explore the nature of the threat of non-state terrorism—threat to national security and the well-being of citizens. I argue th...

متن کامل

Collusion Set Detection Through Outlier Discovery

Digging in the details : a case study in network data mining p. 14 Efficient identification of overlapping communities p. 27 Event-driven document selection for terrorism information extraction p. 37 Link analysis tools for intelligence and counterterrorism p. 49 Mining candidate viruses as potential bio-terrorism weapons from biomedical literature p. 60 Private mining of association rules p. 7...

متن کامل

The Text Mining Handbook - Advanced Approaches in Analyzing Unstructured Data

Text mining is a new and exciting area of computer science research that tries to solve the crisis of information overload by combining techniques from data mining, machine learning, natural language processing, information retrieval, and knowledge management. Similarly, link detection – a rapidly evolving approach to the analysis of text that shares and builds on many of the key elements of te...

متن کامل

Obama’s Counterterrorism Policy and the Washington Post’s Editorials: A Critical Discourse Analysis of Media-State Interaction

American mass media’s relation with the US government in foreign policy decision-making has been the subject of numerous studies in the interdisciplinary field of political communication. This paper reexamines the interaction between the media and the government in the US foreign policy decision-making process, analyzing the possible congruity and/or incongruity between The Washington Post...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005