Skip to main content

One-Class Strategies for Security Information Detection

  • Conference paper
Intelligence and Security Informatics (WISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3917))

Included in the following conference series:

  • 671 Accesses

Abstract

Detecting security-related information is a critical component of ISI research, which involves studying a wide range of technical and systems challenges related to the acquisition, collection, storage, retrieval, synthesis, and analysis of security-related information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Chen, H., Wang, F.-Y.: Artificial Intelligence for Homeland Security. IEEE Intelligent Systems 20(5), 12–16 (2005)

    Article  Google Scholar 

  2. Yao, Y.Y., Wang, F.-Y., Wang, J., Zeng, D.: Rule + Exception Strategies for Security Information Analysis. IEEE Intelligent Systems 20(5), 52–57 (2005)

    Article  Google Scholar 

  3. Chen, H., Wang, F.-Y., Zeng, D.: Intelligence and Security informatics for Homeland Security: Information, Communication and Transportation. IEEE Trans. Intelligent Transportation Systems 5(4), 329–341 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tao, Q., Wu, Gw., Wang, J. (2006). One-Class Strategies for Security Information Detection. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_27

Download citation

  • DOI: https://doi.org/10.1007/11734628_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33361-6

  • Online ISBN: 978-3-540-33362-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics