did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780123972002

Advances in Intelligence and Security Informatics

by ;
  • ISBN13:

    9780123972002

  • ISBN10:

    0123972000

  • Format: Hardcover
  • Copyright: 2012-04-13
  • Publisher: Elsevier Science Ltd

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $125.00 Save up to $37.50
  • Rent Book $87.50
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE

    7-Day eTextbook Access 7-Day eTextbook Access

    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

The Series in Intelligent Systems publishes titles that cover state of the art knowledge and the latest advances in research and development in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The Series publishes titles in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. Titles focus on professional and academic reference works and handbooks. The readership for the series is broad, reflecting the wide range of intelligent systems interest and application, but focuses on engineering (in particular automation, control, mechatronics, robotics, transportation, automotive, aerospace), electronics and electronic design, and computer science. This book presents the latest issues and development in service science. (Service Science is the interdisciplinary approach to the study, design, and implementation of services systems - complex systems in which specific arrangements of people and technologies take actions that provide value for others. More precisely, service science has been defined as the application of science, management, and engineering disciplines to tasks that one organization beneficially performs for and with another). Both theory and applications issues are covered in the book, which integrates a variety of disciplines - including areas in management, engineering, and information systems. These substantive topics are all related to service science from various perspectives. Extensive applications and cast studies of latest developments showcase current best practice and provide insights and guidelines to assist in building of successful service systems. Presents the latest service science research from both theoretical and applications perspectives Includes coverage of applications in a wide variety high growth sectors, along with real-world frameworks and design techniques Extensive applications and cast studies of latest developments showcase current best practice and provide insights and guidelines to assist in building of successful service systems.

Author Biography

Wenji Mao, Associate Professor, State Key Laboratory of Management and Control for Complex Systems, Institute of Automation, Chinese Academy of Sciences. Prof. Mao has published widely in ACM-, JEEE- and AAAI-sponsored journals arid conference proceedings, and serves as co-chairs and on the organizing and program committees of various international conferences and workshops on security informatics, social computing and intelligent agents. She is a member of ACM, AAAI, INFORMS and serves on the Technical Committee on Homeland Security of the IEEE Systems, Man, Cybernetics Society. Fei-Yue Wang, Professor, NUDT, Chinese Academy of Sciences. Currently, Prof. Wang is the Editor-in-Chief of the IEEE Intelligent Systems and IEEE Transactions on Intelligent Transportation Systems. He is a Fellow of IEEE, INCOSE, IFAC, ASME, and AAAS. In 2007, he received the 2nd Class National Prize in Natural Sciences of China and was awarded ACM Distinguished Scientist for his work in intelligent systems and social computing. In 2011, he received IEEE ITSS Outstanding ITS Research Award.

Table of Contents

Prefacep. ix
Acknowledgementsp. xi
Intelligence and Security Informatics: Research Frameworksp. 1
Research Methodology and Frameworks for ISIp. 1
The ACP Approachp. 2
Modeling with Artificial Societiesp. 2
Analysis with Computational Experimentsp. 3
Control Through Parallel Executionp. 3
Foundations in Philosophy and Physicsp. 4
Outline of Chaptersp. 5
Agent Modeling of Terrorist Organization Behaviorp. 9
Modeling Organizational Behaviorp. 9
Action Extraction from the Webp. 10
Action Data Collectionp. 10
Raw Action Extractionp. 10
Action Eliminationp. 11
Action Refinementp. 11
Extracting Causal Knowledge from the Webp. 11
Construction of Action Hierarchyp. 13
Designing, Causal Scenariosp. 15
Case Study on Terrorist Organizationp. 16
Conclusionp. 18
Security Story Generation for Computational Experimentsp. 21
Story Generation Systemsp. 21
System Workflow and Narrative Structurep. 23
Story Extraction Approachp. 25
Text Processing with Domain Knowledgep. 25
Event Detection and Event Element Extractionp. 26
Design and Organization of Patternsp. 27
Event Element Standardizationp. 28
Evaluation of Event Relationsp. 29
Experimentp. 29
Conclusionp. 30
Forecasting Croup Behavior via Probabilistic Plan Inferencep. 33
Review of Plan-Based Inferencep. 34
Probabilistic Plan Representationp. 35
Probabilistic Reasoning Approachp. 36
Notationp. 36
Computationp. 36
Case Study in Security Informaticsp. 39
Construction of Plan Libraryp. 39
The Test Setp. 40
Experimental Resultsp. 42
Conclusionp. 43
Forecasting Complex Croup Behavior via Multiple Plan Recognitionp. 45
Multiple Plan Recognition for Behavior Predictionp. 46
The MPR Problem Definitionp. 47
The Proposed MPR Approachp. 49
Constructing the Explanation Graphp. 49
Computing Probability of an Explanationp. 51
Finding the Best Explanationp. 53
Algorithm and Complexity Analysisp. 53
Discussionp. 55
Case Study in Security Informaticsp. 55
Experimental Designp. 56
Resultsp. 57
Conclusionp. 58
Social Computing in ISI: A Synthetic Viewp. 61
Social Computingp. 61
Theoretical and Infrastructure Underpinningsp. 62
Major Application Areasp. 64
A Social Computing-Based ISI Research Frameworkp. 64
Modeling with Artificial Societiesp. 65
Analysis with Computational Experimentsp. 66
Control and Management Through Parallel Executionp. 66
Main Issues in the ACP-Based ISI Research Frameworkp. 66
Modeling Cyber-Physical Societiesp. 66
Scenario-Based Computational Experiment and Evaluationp. 67
Interactive Co-Evolution of Artificial and Actual Systemsp. 68
Social Media Information Processing and Standardizationp. 69
ISI Research Platformp. 69
Summaryp. 70
Cyber-Enabled Social Movement Organizationsp. 73
Studies on Social Movement Organizations: A Reviewp. 74
A New Research Framework for CeSMOsp. 76
CeSMO Research Questionsp. 76
A Social Computing-Based CeSMO Research Frameworkp. 76
Case Study: Wenchuan Earthquakep. 77
Discussions on CeSMO Research Issuesp. 85
CeSMO Behavior Modelingp. 86
CeSMO Network Analysisp. 86
CeSMO Social and Cultural Information Modeling and Analysisp. 86
CeSMO Behavior Predictionp. 87
Conclusionp. 87
Cultural Modeling for Behavior Analysis and Predictionp. 91
Modeling Cultural Data in Security Informaticsp. 92
Major Machine Learning Methodsp. 93
Naive Bayesian (NB)p. 93
Support Vector Machines (SVMs)p. 93
Artificial Neural Networksp. 93
k-Nearest Neighbor (kNN)p. 93
Decision Treesp. 94
Random Forest (RF)p. 94
Associative Classification (AC)p. 94
Experiment and Analysisp. 94
Datasetsp. 94
Evaluation Measuresp. 95
Experimental Resultsp. 96
Observations and Analysisp. 96
Discussions on Cultural Modeling Research Issuesp. 98
Cultural Datasets Constructionp. 98
Attribute Selectionp. 98
Best Performance of Classifiersp. 99
Handling the Class Imbalance Problemp. 99
Model Interpretabilityp. 99
Incorporation of Domain Knowledgep. 100
Cultural and Social Dynamics of Behavioral Patternsp. 100
Conclusionp. 100
Indexp. 103
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program