Proc. SPIE. 6973, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008
KEYWORDS: Data mining, Statistical analysis, Data modeling, Databases, Aluminum, Analytical research, Social networks, Network security, Social network analysis, Data analysis
In this paper we examine the latest thinking, approaches and methodologies in use for finding the nuggets of information
and subliminal (and perhaps intentionally hidden) patterns and associations that are critical to identify criminal activity
and suspects to private and government security agencies. An emphasis in the paper is placed on Social Network
Analysis and Investigative Data Mining, and the use of these technologies in the counterterrorism domain. Tools and
techniques from both areas are described, along with the important tasks for which they can be used to assist with the
investigation and analysis of terrorist organizations. The process of collecting data about these organizations is also
considered along with the inherent difficulties that are involved.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print format on
SPIE.org.