Wiil et al., 2013 - Google Patents
Knowledge management tools for terrorist network analysisWiil et al., 2013
- Document ID
- 16547422866096284129
- Author
- Wiil U
- Gniadek J
- Memon N
- Petersen R
- Publication year
- Publication venue
- Knowledge Discovery, Knowledge Engineering and Knowledge Management: Second International Joint Conference, IC3K 2010, Valencia, Spain, October 25-28, 2010, Revised Selected Papers 2
External Links
Snippet
A terrorist network is a special kind of social network with emphasis on both secrecy and efficiency. Such networks (consisting of nodes and links) needs to be analyzed and visualized in order to gain a deeper knowledge and understanding that enable network …
- 238000003012 network analysis 0 title abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30994—Browsing or visualization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2216/00—Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F17/30 and subgroups
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alghamdi et al. | An intelligent model for online recruitment fraud detection | |
Ahn et al. | A task taxonomy for network evolution analysis | |
Bolt et al. | Process variant comparison: using event logs to detect differences in behavior and business rules | |
Al-Mekhlal et al. | A synthesis of big data definition and characteristics | |
US7777743B2 (en) | Viewing multi-dimensional data through hierarchical visualization | |
Gilbert et al. | Communities and hierarchical structures in dynamic social networks: analysis and visualization | |
Rapacciuolo et al. | Deriving indicators of biodiversity change from unstructured community‐contributed data | |
CN112685272B (en) | Interpretable user behavior abnormity detection method | |
Hassan et al. | Influential tweeters in relation to highly cited articles in altmetric big data | |
Lopes et al. | Machine learning partners in criminal networks | |
Lallie et al. | Evaluating practitioner cyber-security attack graph configuration preferences | |
Goncalves et al. | Gathering alumni information from a web social network | |
Mansmann et al. | Dynamic visual analytics—facing the real-time challenge | |
Rossy et al. | The contribution of forensic science to the analysis of crime networks | |
Wiil et al. | CRIMEFIGHTER ASSISTANT-A Knowledge Management Tool for Terrorist Network Analysis | |
Chae et al. | Structural determinants of Human Resource Development research collaboration networks: A Social‐Network Analysis of publications Between 1990 to 2014 | |
Wiil et al. | Knowledge management tools for terrorist network analysis | |
Costa et al. | Towards a design observatory: the case of scholarly design research in Portugal | |
Hang et al. | RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation | |
Mo et al. | Passive diagnosis for WSNs using time domain features of sensing data | |
Marzukhi et al. | Framework of Knowledge-Based System for United Nations Peacekeeping Operations Using Data Mining Technique | |
Naranjo et al. | Connecting the Dots: Examining Visualization Techniques for Enterprise Architecture Model Analysis. | |
Yang et al. | Networked data mining based on social network visualizations | |
Ruttenberg et al. | Probabilistic modeling of insider threat detection systems | |
Glomseth et al. | Research propositions for determinants of police investigation performance |