Guest Editors' Introduction: Artificial Intelligence for Homeland Security
暂无分享,去创建一个
[1] Robert O'Harrow,et al. No place to hide , 1997, Science.
[2] Hsinchun Chen,et al. Medical Informatics: Knowledge Management and Data Mining in Biomedicine (Operations Research/Computer Science Interfaces) , 2005 .
[3] Ramasamy Uthurusamy,et al. EVOLVING DATA MINING INTO SOLUTIONS FOR INSIGHTS , 2002 .
[4] Lynette Hirschman,et al. MiTAP for Biosecurity: A Case Study , 2002, AI Mag..
[5] Hsinchun Chen,et al. Intelligence and Security Informatics for International Security: Information Sharing and Data Mining (Integrated Series in Information Systems) , 2006 .
[6] Yan Huang,et al. Evacuation Planning: A Capacity Constrained Routing Approach , 2003, ISI.
[7] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[8] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[9] Ramasamy Uthurusamy,et al. Evolving data into mining solutions for insights , 2002, CACM.
[10] Gang Wang,et al. Automatically detecting deceptive criminal identities , 2004, CACM.
[11] Jack Cook,et al. Social, ethical and legal issues of data mining , 2003 .
[12] Alan L. Rector,et al. MEDICAL INFORMATICS , 1990, The Lancet.
[13] Lawrence M. Fagan,et al. Medical informatics: computer applications in health care and biomedicine (Health informatics) , 2003 .