KEYWORDS: Data mining, Data modeling, Aluminum, Network security, Analytical research, Social network analysis, Databases, Social networks, Statistical analysis, Data analysis
In this paper we examine the latest thinking, approaches and methodologies in use for finding the nuggets of information
and subliminal (and perhaps intentionally hidden) patterns and associations that are critical to identify criminal activity
and suspects to private and government security agencies. An emphasis in the paper is placed on Social Network
Analysis and Investigative Data Mining, and the use of these technologies in the counterterrorism domain. Tools and
techniques from both areas are described, along with the important tasks for which they can be used to assist with the
investigation and analysis of terrorist organizations. The process of collecting data about these organizations is also
considered along with the inherent difficulties that are involved.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.