Computational approaches to suspicion in adversarial settings

作者: David B. Skillicorn

DOI: 10.1007/S10796-010-9279-4

关键词:

摘要: Intelligence and law enforcement agencies collect large datasets, but have difficulty focusing analyst attention on the most significant records structures within them. We address this problem using suspicion, which we interpret as relevant anomaly, measure associated with data individuals. For datasets collected about widespread activities in signs of adversarial activity are rare, suggest ways to build predictive models suspicion. result lawful interception, a model suspicion spreading social network implied by intercepted data.

参考文章(20)
D.M.J. Tax, One-class classification TU Delft, Delft University of Technology. ,(2001)
Christopher M. Bishop, Neural networks for pattern recognition ,(1995)
D. B. Skillicorn, Social Network Analysis via Matrix Decompositions Emergent Information Technologies and Enabling Policies for Counter-Terrorism. pp. 367- 391 ,(2005) , 10.1002/047178656X.CH19
Hans-Peter Kriegel, Martin Ester, Jörg Sander, Xiaowei Xu, A density-based algorithm for discovering clusters in large spatial Databases with Noise knowledge discovery and data mining. pp. 226- 231 ,(1996)
J.G. Dutrisac, D.B. Skillicorn, Hiding clusters in adversarial settings intelligence and security informatics. pp. 185- 187 ,(2008) , 10.1109/ISI.2008.4565051
Gene H. Golub, Charles F. Van Loan, Matrix computations (3rd ed.) Johns Hopkins University Press. ,(1996)
Timothy Bell, Ian H. Witten, John G. Cleary, Modeling for text compression ACM Computing Surveys. ,vol. 21, pp. 557- 591 ,(1989) , 10.1145/76894.76896
A. P. Dempster, N. M. Laird, D. B. Rubin, Maximum Likelihood from Incomplete Data Via theEMAlgorithm Journal of the Royal Statistical Society: Series B (Methodological). ,vol. 39, pp. 1- 22 ,(1977) , 10.1111/J.2517-6161.1977.TB01600.X
J.G. Dutrisac, D.B. Skillicorn, Subverting prediction in adversarial settings intelligence and security informatics. pp. 19- 24 ,(2008) , 10.1109/ISI.2008.4565023