This Article 
 Bibliographic References 
 Add to: 
AI and Security Informatics
September/October 2010 (vol. 25 no. 5)
pp. 82-90
Hsinchun Chen, University of Arizona

Based on the available crime and intelligence knowledge, federal, state, and local authorities can make timely and accurate decisions to select effective strategies and tactics as well as allocate the appropriate amount of resources to detect, prevent, and respond to future attacks. Facing the critical mission of international security and various data and technical challenges, there is a pressing need to develop the science of security informatics. The main objective is the development of advanced information technologies, systems, algorithms, and databases for security-related applications using an integrated technological, organizational, and policy-based approach. Intelligent systems have much to contribute for this emerging field.

1. "National Strategy for Homeland Security," US Office of Homeland Security, 2002.
2. Nat'l Research Council, "Making the Nation Safer: The Role of Science and Technology in Countering Terrorism," Nat'l Academy Press, 2002.
3. H. Chen, Intelligence and Security Informatics for International Security: Information Sharing and Data Mining, Springer, 2006.
1. J. Jonas and J. Harper, "Effective Counterterrorism and the Limited Role of Predictive Data Mining," Policy Analysis, vol. 584, Cato Inst., 2006, pp. 1–12.
2. D.M.J. Tax, "One Class Classification," doctoral dissertation, Technical Univ. Delft, 2000.
3. M.A.J. Bourassa and D.B. Skillicorn, "Hardening Adversarial Prediction with Anomaly Tracking," Proc. Int'l Conf. IEEE Intelligence and Security Informatics, IEEE Press, 2009, pp. 43–48.
4. K.A. Taipale, "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data," Columbia Science and Technology Law Rev., vol. 5, no. 2, Dec. 2003.
1. H. Chen, Intelligence and Security Informatics and International Security: Information Sharing and Data Mining, Springer, 2006.
2. T. Berners Lee, J. Hendler, and O. Lassila, "The Semantic Web," Scientific Am.,17 May 2001.
3. M. Scannapieco et al., "Privacy-Preserving Schema and Data Matching," Proc. ACM SIGMOD Int'l Conf. Management of Data, ACM Press, 2007 pp. 653–664.
4. B. Thuraisingham, Building Trustworthy Semantic Webs, CRC Press, 2007.
5. T. Cadenhead, M. Kantarcioglu, and B. Thuraisingham, "Scalable and Efficient Reasoning for Enforcing Role-Based Access Control," Proc. IFIP 11.3 Conf. Data and Applications Security, IFIP, 2010.
6. R. Agrawal and R. Srikant, "Privacy-Preserving Data Mining," Proc. ACM SIGMOD Int'l Conf. Management of Data, ACM Press, 2000, pp. 439–450.
7. M. Kantarcioglu and J. Vaidya, "Secure Multiparty Computation Methods," Encyclopedia of Database Systems, 2009.
1. H. Chen and C.C. Yang, Intelligence and Security Informatics: Techniques and Applications, Springer Verlag, 2008.
2. P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, 2001, pp. 1010–1027.
3. K. Liu and E. Terzi, "Towards Identity Anonymization on Graphs," Proc. ACM SIGMOD, ACM Press, 2008.
4. X. Tang and C.C. Yang, "Generalizing Terrorist Social Networks with K-Nearest Neighbor and Edge Betweenness for Social Network Integration and Privacy Preservation," Proc. IEEE Int'l Conf. Intelligence and Security Informatics, 2010.
5. C.C. Yang, X. Tang, and B.M. Thuraisingham, "Social Networks Integration and Privacy Preservation using Subgraph Generalization," Proc. AMC SIGKDD Workshop CyberSecurity and Intelligence Informatics, 2009.

Index Terms:
security informatics, Semantic Web, terrorism, security, data mining, intelligent systems
Hsinchun Chen, "AI and Security Informatics," IEEE Intelligent Systems, vol. 25, no. 5, pp. 82-90, Sept.-Oct. 2010, doi:10.1109/MIS.2010.116
Usage of this product signifies your acceptance of the Terms of Use.