Meeting security challenges through data analytics and decision support /
The sheer quantity of widely diverse data which now results from multiple sources presents a problem for decision-makers and analysts, who are finding it impossible to cope with the ever-increasing flow of material. This has potentially serious consequences for the quality of decisions and operation...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico Congresos, conferencias eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam, Netherlands :
IOS Press,
2016.
|
Colección: | NATO science for peace and security series. Information and communication security ;
v. 47. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Title Page; Preface; Contents; Section 1. Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.
- Selective Sensitivity Sensor for Explosive Detection and IdentificationProtection and Recovery of Tampered Images Using Self-Embedding Procedures; Terrorism as a Threat to Tourism; Sustainable Development as a Tool Against Environmental Vulnerability; Section 2. Maritime and Border Security; Toward a Better Future Through Maritime Security; What Matters Most Is Not the Size of the ``Storm'' but the Scale of the Impact; Reasoning with Relational Models for Maritime Domain Security; PASSAGES
- A System for Improved Safety and Security of Maritime Operations in Arctic Areas.
- Modeling Maritime Contraband Trafficking Activities with the Agent-Based ApproachARETHUS
- A Decision Support Platform for Reasoning About Security; Main Aspects of Border Crossing Control Security Provision; Comparing Information Structures Used in the Maritime Defence and Security Domain; Border Surveillance Using UAVs with Thermal Camera; Human Identification Using Virtual 3D Imaging to Control Border Crossing; Naval Ship Classification with Generalized Belief Functions Using a New Approximation Algorithm; Section 3. Cyber Security; Hide and Seek in the Information Age.
- Real Time Streaming AlgorithmEfficiency of Generating Highly Nonlinear Boolean Functions over Quasigroups; Secure Data Hiding in PDF Files Using an Encrypted Secret Message; Secure Real-Time Data Transfer in the Cloud; Two-Party Oblivious DFA Evaluation Protocol; Distributed Data Storage in Cloud Systems Based on Error Correcting Codes; A Security Assessment Framework for e-Health: A Croatian Perspective; Security Issues of the e-Infrastructure for Environmental Research; Critical Aviation Information Systems Cybersecurity.
- Information Security
- Basis of the Education System for Digital Generation ZAre We Ready to Educate Security Professionals?; A Study of Security Threats in the Private Cloud; Subject Index; Author Index.