The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet occasionally experiences large disruptions, arising from both natural and manmade disturbances, and it is of significant interest to develop methods for locating within the network the source of a given disruption (i.e., the network element(s) whose perturbation initiated the event). This paper presents a near real-time approach to realizing this logical localization objective. The proposed...
The National Police Service Agency of the Netherlands developed a model to classify (potential) jihadists in four sequential phases of radicalism. The goal of the model is to signal the potential jihadist as early as possible to prevent him or her to enter the next phase. This model has up till now, never been used to actively find new subjects. In this paper, we use Formal Concept Analysis to extract...
We anticipate future attacks would evolve to become more sophisticated to outwit existing intrusion detection techniques. Existing anomaly analysis techniques and signature-based detection practices can no longer effective. We believe intrusion detection systems (IDSs) of the future will need to be capable to detect or infer attacks based on more valuable information from the network-related properties...
In recent years, there have been numerous studies from a variety of perspectives analyzing the Internet presence of hate and extremist groups. Yet the websites and forums of extremist and terrorist groups have long remained an underutilized resource for terrorism researchers due to their ephemeral nature and access and analysis problems. The purpose of the Dark Web archive is to provide a research...
We analyze the restrictions to information sharing imposed by MultiLevel Secure Databases. We offer several measures to quantify the information loss due to security levels, and propose the problem of minimizing such loss without allowing users to access information above their security clearance. We give a partial solution to the problem, and discuss some of its shortcomings.
Proper patrol route planning increases the effectiveness of police patrolling and improves public security. In this paper we present a new approach for the real-time patrol route planning in a dynamic environment. We first build a mathematic framework, and then propose a fast algorithm developed from the Cross Entropy method to meet the real-time computation requirement needed for many applications...
The architecture and core mechanisms of a decision support system for a Marine Security Operations Centre (MSOC) are presented. The goal of this system is to improve coordination in emergency response services during critical situations, including detection and prevention of illegal activities. The system design emphasizes robustness and scalability through its decentralized control structure, automated...
Alert correlation is a promising technique in intrusion detection. It analyzes the alerts from one or more intrusion detection system and provides a compact summarized report and high-level view of attempted intrusions which highly improves security effectiveness. Correlation component is a procedure which aggregates alerts according to certain criteria. The aggregated alerts could have common features...
Public safety has been a great concern in recent years as terrorism occurs everywhere. When a public event is held in an urban environment like Olympic games or soccer games, it is important to keep public safe and at the same time, to have a specific plan to control and rescue the public in the case of a terrorist attack. In order to better position public safety in communities against potential...
Automated extraction of named entities is an important text analysis task. In addition to recognizing the occurrence of entity names, it is important to be able to label those names by type. Most entity extraction techniques categorize extracted entities into a few basic types, such as PERSON, ORGANIZATION, and LOCATION. This paper presents an approach for generating more fine-grained subdivisions...
Fear of crime is a central topic in the field of victimization. In particular, criminologists are interested in the environmental structures and cues that generate fear. Research has shown that fear of crime has a direct impact on pedestrian navigation through the urban setting. Most studies have used traditional methods such as surveys or interviews. Researchers have debated the methodological issues...
Object detecting and tracking at a distance has been a big problem in the research field of wide area security. This paper introduces a real time active vision system which can track a moving object from 1 meter to 200 meters. This visual servo system is mainly structured of three mechanical freedoms of pan, tilt and zoom. An eagle's eye mechanism is proposed to obtain a wide field of view (FOV) in...
We present a technique to represent the structure of large social networks through ego-centered network neighborhoods. This provides a local view of the network, focusing on the vertices and their kth order neighborhoods allowing discovery of interesting patterns and features of the network that would be hidden in a global network analysis. We present several examples from a corporate phone call network...
As an important information portal, online healthcare forum are playing an increasingly crucial role in disseminating information and offering support to people. It connects people with the leading medical experts and others who have similar experiences. During an epidemic outbreak, such as H1N1, it is critical for the health department to understand how the public is responding to the ongoing pandemic,...
This article describes an architecture for Information Extraction systems on the web, based on Natural Language Processing (NLP) and especially geared toward the exploration of information about crime. The main feature of the architecture is its NLP module, which is based on the Semantic Inferential Model. We demonstrate the feasibility of the architecture through the implementation thereof to provide...
Terrorism organizations are devising increasingly sophisticated plans to conduct attacks. The ability of emulating or constructing attack plans by potential terrorists can help us understand the intents and motivation behind terrorism activities. A feasible computational method to construct plans is planning technique in AI. Traditionally, AI planning methods rely on a predefined domain theory which...
While there is a consensus among developed countries over the need to combat terrorism, there are marked differences on how to accomplish that. Recently the European Union (EU) rejected a US-EU agreement on financial data exchange. Shifts in power in Europe are taking place, which contributed to this rejection. But more basically, there is a difference in views on the balance between about managing...
This paper describes the structure of an executive decision support system based on a data warehouse about offences and clearance rates in British Columbia. The system was developed at the Institute for Canadian Urban Research Studies at Simon Fraser University. The paper explains how the data mining and automated statistical analysis in this system can be used by criminologists for analysis of crime...
Computational criminology is an area of research that joins advanced theories in criminology with theories and methods in mathematics, computing science, geography and behavioural psychology. It is a multidisciplinary approach that takes the strengths of several disciplines and, with semantic challenges, builds new methods for the analysis of crime and crime patterns. This paper presents a developing...
There is considerable interest in developing predictive capabilities for social diffusion processes, for instance enabling early identification of contentious “triggering” incidents that are likely to grow into large, self-sustaining mobilization events. Recently we have shown, using theoretical analysis, that the dynamics of social diffusion may depend crucially upon the interactions of social network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.