Meeting security challenges through data analytics and decision support / edited by Elisa Shahbazian and Galina Rogova.

By: NATO Advanced Research Workshop on Meeting Security Challenges Through Data Analytics and Decision Support (2015 : Aghveran, Armenia)
Contributor(s): Shahbazian, E. (Elisa) [editor.] | Rogova, Galina [editor.]
Material type: TextTextSeries: NATO science for peace and security series: v. 47.Publisher: Amsterdam, Netherlands : IOS Press, 2016Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781614997160; 1614997160Subject(s): Terrorism -- Prevention -- Congresses | National security -- Congresses | Computer security -- Congresses | BUSINESS & ECONOMICS -- Infrastructure | SOCIAL SCIENCE -- General | Computer security | National security | Terrorism -- PreventionGenre/Form: Electronic books. | Conference papers and proceedings. DDC classification: 363.325/17 LOC classification: HV6431Online resources: Click here to access online
Contents:
Title Page; Preface; Contents; Section 1. Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.
Selective Sensitivity Sensor for Explosive Detection and IdentificationProtection and Recovery of Tampered Images Using Self-Embedding Procedures; Terrorism as a Threat to Tourism; Sustainable Development as a Tool Against Environmental Vulnerability; Section 2. Maritime and Border Security; Toward a Better Future Through Maritime Security; What Matters Most Is Not the Size of the ``Storm'' but the Scale of the Impact; Reasoning with Relational Models for Maritime Domain Security; PASSAGES -- A System for Improved Safety and Security of Maritime Operations in Arctic Areas.
Modeling Maritime Contraband Trafficking Activities with the Agent-Based ApproachARETHUS -- A Decision Support Platform for Reasoning About Security; Main Aspects of Border Crossing Control Security Provision; Comparing Information Structures Used in the Maritime Defence and Security Domain; Border Surveillance Using UAVs with Thermal Camera; Human Identification Using Virtual 3D Imaging to Control Border Crossing; Naval Ship Classification with Generalized Belief Functions Using a New Approximation Algorithm; Section 3. Cyber Security; Hide and Seek in the Information Age.
Real Time Streaming AlgorithmEfficiency of Generating Highly Nonlinear Boolean Functions over Quasigroups; Secure Data Hiding in PDF Files Using an Encrypted Secret Message; Secure Real-Time Data Transfer in the Cloud; Two-Party Oblivious DFA Evaluation Protocol; Distributed Data Storage in Cloud Systems Based on Error Correcting Codes; A Security Assessment Framework for e-Health: A Croatian Perspective; Security Issues of the e-Infrastructure for Environmental Research; Critical Aviation Information Systems Cybersecurity.
Information Security -- Basis of the Education System for Digital Generation ZAre We Ready to Educate Security Professionals?; A Study of Security Threats in the Private Cloud; Subject Index; Author Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

"Proceedings of the NATO Advanced Research Workshop on Meeting Security Challenges Through Data Analytics and Decision Support, Aghveran, Armenia, 1-5 June 2015."

International conference proceedings.

Includes indexes.

Online resource; title from PDF title page (IOS Press, viewed December 7, 2016).

Title Page; Preface; Contents; Section 1. Counter Terrorism: Methodology and Applications; Arguing About Uncertain Heterogeneous Information for Threat Assessment; Intelligence Analysis: Needs and Solutions; Building Agile Human/Machine Teams with Controlled Natural Language; Military Usages of Speech and Language Technologies: A Review; Comparative Studies on Using Semantic Filtering for Open Relation Identification; Towards an Integration of Fusion of Information and Analytics Technologies (FIAT) to Improve Dependability and Security in Complex Systems; Data Fusion and Response Management.

Selective Sensitivity Sensor for Explosive Detection and IdentificationProtection and Recovery of Tampered Images Using Self-Embedding Procedures; Terrorism as a Threat to Tourism; Sustainable Development as a Tool Against Environmental Vulnerability; Section 2. Maritime and Border Security; Toward a Better Future Through Maritime Security; What Matters Most Is Not the Size of the ``Storm'' but the Scale of the Impact; Reasoning with Relational Models for Maritime Domain Security; PASSAGES -- A System for Improved Safety and Security of Maritime Operations in Arctic Areas.

Modeling Maritime Contraband Trafficking Activities with the Agent-Based ApproachARETHUS -- A Decision Support Platform for Reasoning About Security; Main Aspects of Border Crossing Control Security Provision; Comparing Information Structures Used in the Maritime Defence and Security Domain; Border Surveillance Using UAVs with Thermal Camera; Human Identification Using Virtual 3D Imaging to Control Border Crossing; Naval Ship Classification with Generalized Belief Functions Using a New Approximation Algorithm; Section 3. Cyber Security; Hide and Seek in the Information Age.

Real Time Streaming AlgorithmEfficiency of Generating Highly Nonlinear Boolean Functions over Quasigroups; Secure Data Hiding in PDF Files Using an Encrypted Secret Message; Secure Real-Time Data Transfer in the Cloud; Two-Party Oblivious DFA Evaluation Protocol; Distributed Data Storage in Cloud Systems Based on Error Correcting Codes; A Security Assessment Framework for e-Health: A Croatian Perspective; Security Issues of the e-Infrastructure for Environmental Research; Critical Aviation Information Systems Cybersecurity.

Information Security -- Basis of the Education System for Digital Generation ZAre We Ready to Educate Security Professionals?; A Study of Security Threats in the Private Cloud; Subject Index; Author Index.

There are no comments for this item.

to post a comment.

Powered by Koha