Share Email Print
cover

Proceedings Paper

A data mining approach to intelligence operations
Author(s): Nasrullah Memon; David L. Hicks; Nicholas Harkiolakis
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In this paper we examine the latest thinking, approaches and methodologies in use for finding the nuggets of information and subliminal (and perhaps intentionally hidden) patterns and associations that are critical to identify criminal activity and suspects to private and government security agencies. An emphasis in the paper is placed on Social Network Analysis and Investigative Data Mining, and the use of these technologies in the counterterrorism domain. Tools and techniques from both areas are described, along with the important tasks for which they can be used to assist with the investigation and analysis of terrorist organizations. The process of collecting data about these organizations is also considered along with the inherent difficulties that are involved.

Paper Details

Date Published: 17 March 2008
PDF: 12 pages
Proc. SPIE 6973, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, 697309 (17 March 2008); doi: 10.1117/12.780835
Show Author Affiliations
Nasrullah Memon, Aalborg Univ. (Denmark)
Hellenic American Univ. (Greece)
David L. Hicks, Aalborg Univ. (Denmark)
Nicholas Harkiolakis, Hellenic American Univ. (Greece)


Published in SPIE Proceedings Vol. 6973:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008
William J. Tolone; William Ribarsky, Editor(s)

© SPIE. Terms of Use
Back to Top