咨询与建议

限定检索结果

文献类型

  • 11 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 13 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 土木工程
    • 2 篇 交通运输工程
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...

主题

  • 18 篇 intelligence and...
  • 3 篇 text classificat...
  • 3 篇 mining user gene...
  • 3 篇 mutual informati...
  • 2 篇 ontology mapping
  • 2 篇 homeland securit...
  • 2 篇 social network a...
  • 2 篇 border and trans...
  • 2 篇 public safety in...
  • 2 篇 infectious disea...
  • 2 篇 tumblr
  • 2 篇 machine learning
  • 2 篇 social computing
  • 2 篇 social media ana...
  • 1 篇 scale-free prope...
  • 1 篇 business intelli...
  • 1 篇 user technology ...
  • 1 篇 database develop...
  • 1 篇 information shar...
  • 1 篇 data privacy

机构

  • 6 篇 univ arizona dep...
  • 3 篇 abb corp res ban...
  • 2 篇 chinese acad sci...
  • 2 篇 univ arizona dep...
  • 1 篇 virginia tech bl...
  • 1 篇 univ arizona dep...
  • 1 篇 indraprasath ins...
  • 1 篇 fayetteville sta...
  • 1 篇 fayetteville sta...
  • 1 篇 stetson universi...
  • 1 篇 univ regina dept...
  • 1 篇 drexel univ coll...
  • 1 篇 university of ar...
  • 1 篇 chinese acad sci...
  • 1 篇 sarl new delhi
  • 1 篇 univ arizona dep...
  • 1 篇 iiit delhi new d...
  • 1 篇 indraprastha ins...
  • 1 篇 guangzhou univ c...
  • 1 篇 villanova univer...

作者

  • 5 篇 sureka ashish
  • 5 篇 agarwal swati
  • 4 篇 chen hsinchun
  • 3 篇 zeng d
  • 3 篇 wang fy
  • 3 篇 kaza siddharth
  • 2 篇 chen hc
  • 2 篇 wingyan chung
  • 1 篇 homa atabakhsh
  • 1 篇 ray villalobos
  • 1 篇 hsinchun chen
  • 1 篇 goyal vikram
  • 1 篇 yao yy
  • 1 篇 wang hui
  • 1 篇 edward carr
  • 1 篇 tian zhihong
  • 1 篇 siddharth kaza
  • 1 篇 hu paul jen-hwa
  • 1 篇 wang tao
  • 1 篇 wang j

语言

  • 18 篇 英文
检索条件"主题词=intelligence and security informatics"
18 条 记 录,以下是1-10 订阅
排序:
Key Factors Affecting User Adoption of Open-Access Data Repositories in intelligence and security informatics: An Affordance Perspective
收藏 引用
ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS 2022年 第1期13卷 10-10页
作者: Wen, Bo Hu, Paul Jen-Hwa Ebrahimi, Mohammadreza Chen, Hsinchun Univ Utah David Eccles Sch Business Dept Operat & Informat Syst Salt Lake City UT 84112 USA Univ S Florida Muma Coll Business Sch Informat Syst & Management Tampa FL 33620 USA Univ Arizona Dept Management Informat Syst Tucson AZ 85721 USA
Rich, diverse cybersecurity data are critical for efforts by the intelligence and security informatics (ISI) community. Although open-access data repositories (OADRs) provide tremendous benefits for ISI researchers an... 详细信息
来源: 评论
Open Source Social Media Analytics for intelligence and security informatics Applications  4th
Open Source Social Media Analytics for Intelligence and Secu...
收藏 引用
4th International Conference on Big Data Analytics (BDA)
作者: Agarwal, Swati Sureka, Ashish Goyal, Vikram Delhi IIITD Indraprastha Inst Informat Technol New Delhi India SARL New Delhi India
Open-Source intelligence (OSINT) is intelligence collected and inferred from publicly available and overt sources of information. Open-Source social media intelligence is a sub-field within OSINT with a focus on extra... 详细信息
来源: 评论
Collaboration Pattern and Topic Analysis on intelligence and security informatics Research
收藏 引用
IEEE INTELLIGENT SYSTEMS 2014年 第3期29卷 39-46页
作者: Liu, Wenli Zheng, Xiaolong Wang, Tao Wang, Hui Natl Univ Def Technol Ctr Mil Computat Expt & Parallel Syst Techol Changsha Peoples R China Chinese Acad Sci Inst Automat State Key Lab Management & Control Complex Syst Beijing 100864 Peoples R China
In this article, researcher collaboration patterns and research topics on intelligence and security informatics (ISI) are investigated using social network analysis approaches. The collaboration networks exhibit scale... 详细信息
来源: 评论
intelligence and security informatics: developing curricular modules in context (abstract only)  14
Intelligence and security informatics: developing curricular...
收藏 引用
Proceedings of the 45th ACM technical symposium on Computer science education
作者: Wingyan Chung Albert Chan Daniel Plante Ray Villalobos Joseph Woodside Stetson University DeLand FL USA Fayetteville State U. Fayetteville NC USA Stetson U. DeLand FL USA Seminole State College Sanford FL USA Stetson U. Deland FL USA
intelligence and security informatics (ISI) is a cross-disciplinary field that connects advanced information technologies, systems, algorithms, and databases with international, national and homeland security related ... 详细信息
来源: 评论
A Public Psychological Pressure Index for Social Networks
收藏 引用
IEEE ACCESS 2020年 8卷 23457-23469页
作者: Zhang, Hong-Li Jin, Rui Zhang, Yu Tian, Zhihong Harbin Inst Technol Harbin 15001 Peoples R China Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510006 Peoples R China
With the worldwide proliferation of social networks, public opinion analysis of data generated by social networks has become an important field of research. Social networks have become a major platform for public opin... 详细信息
来源: 评论
A Collision of Beliefs: Investigating Linguistic Features for Religious Conflicts Identification on Tumblr  13th
A Collision of Beliefs: Investigating Linguistic Features fo...
收藏 引用
13th International Conference on Distributed Computing and Internet Technology (ICDCIT)
作者: Agarwal, Swati Sureka, Ashish Indraprastha Inst Informat Technol Delhi IIITD Delhi India ABB Corp Res Bangalore Karnataka India
Research shows that with the unexpected emergence of religion and faith, identifying religious conflicts within society has become an important problem for the government and law enforcement agencies. Many social scie... 详细信息
来源: 评论
Role of Author Personality Traits for Identifying Intent Based Racist Posts  7
Role of Author Personality Traits for Identifying Intent Bas...
收藏 引用
Conference on European intelligence and security informatics Conference (EISIC)
作者: Agarwal, Swati Sureka, Ashish IIIT Delhi New Delhi India ABB Corp Res Bangalore Karnataka India
Research shows that people misuse freedom of expressions to post hateful comments about various religion and race. In this paper, we define our problem of radicalization and racism detection as an intent based classif... 详细信息
来源: 评论
But I did not Mean It!- Intent Classification of Racist Posts on Tumblr  7
But I did not Mean It!- Intent Classification of Racist Post...
收藏 引用
Conference on European intelligence and security informatics Conference (EISIC)
作者: Agarwal, Swati Sureka, Ashish Indraprastha Inst Informat Technol New Delhi India ABB Corp Res Bangalore Karnataka India
Research shows that many like-minded people use popular microblogging websites for posting hateful speech against various religions and race. Automatic identification of racist and hate promoting posts is required for... 详细信息
来源: 评论
Using Common-Sense knowledge-base for Detecting Word Obfuscation in Adversarial Communication  7
Using Common-Sense knowledge-base for Detecting Word Obfusca...
收藏 引用
7th International Conference on Communication Systems and Networks
作者: Agarwal, Swati Sureka, Ashish Indraprasath Inst Informat & Technol Delhi Delhi India
Word obfuscation or substitution means replacing one word with another word in a sentence to conceal the textual content or communication. Word obfuscation is used in adversarial communication by terrorist or criminal... 详细信息
来源: 评论
Computing in context (abstract only)  13
Computing in context (abstract only)
收藏 引用
Proceeding of the 44th ACM technical symposium on Computer science education
作者: Robert E. Beck Edward Carr Wingyan Chung Edward Fox Christine Nass Villanova University Villanova PA USA North Carolina A&T Greensboro NC USA Fayetteville State University Fayetteville NC USA Virginia Tech Blacksburg VA USA
As computing moves into its sixth decade as a formal field of study, a great deal of attention is focused on the breadth of relationships between computing and other disciplines. Descriptors of this relationship inclu... 详细信息
来源: 评论