Various government agencies have a stake in knowing when bad actors cross the United States\u27 borders, or how bad actors may be involved in the ow of people across borders. Interviews conducted at border checkpoints with individuals who intend to cross the border can contain valuable information. The quantity of interviews is such that intelligence analysts could benefit greatly from an automation system that extracts the information they are looking for from within the interviews. This would allow them to focus more of their time on analyzing what is extracted as opposed to inspecting all interviews themselves. The information extracted can be written to an SQL database, allowing the information to then be easily and efficiently queried ...
abstract: In September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and m...
The development of new information and communication technologies increased the volume of informati...
The majority of research on covert networks uses social network analysis (SNA) to determine critical...
Various government agencies have a stake in knowing when bad actors cross the United States\u27 bord...
The insider threat poses a significant risk to any network or information system. A general definiti...
This research applies social network analysis and social identity theory to threat assessment invest...
Terrorists use the internet to facilitate every aspect of their nefarious activity. This use creates...
Open-Source Intelligence (OSINT) is largely regarded as a necessary component for cybersecurity inte...
THE IMPLEMENTATION OF ARTIFICIAL INTELLIGENCE IN HARD AND SOFT COUNTERTERRORISM EFFORTS ON SOCIAL ME...
Social network analysis is a powerful set of techniques used by social scientists to study the forma...
To the extent that we permit data mining programs to proceed, they must provide adequate due process...
There is a growing trend of disturbed individuals expressing their unhappiness with elements of gove...
This research is in threat analysis and countermeasures employing Artificial Intelligence (AI) metho...
Most communication in the modern era takes place over some type of cyber network, to include telecom...
Open Source Intelligence using social media is a practice which gives military intelligence analysts...
abstract: In September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and m...
The development of new information and communication technologies increased the volume of informati...
The majority of research on covert networks uses social network analysis (SNA) to determine critical...
Various government agencies have a stake in knowing when bad actors cross the United States\u27 bord...
The insider threat poses a significant risk to any network or information system. A general definiti...
This research applies social network analysis and social identity theory to threat assessment invest...
Terrorists use the internet to facilitate every aspect of their nefarious activity. This use creates...
Open-Source Intelligence (OSINT) is largely regarded as a necessary component for cybersecurity inte...
THE IMPLEMENTATION OF ARTIFICIAL INTELLIGENCE IN HARD AND SOFT COUNTERTERRORISM EFFORTS ON SOCIAL ME...
Social network analysis is a powerful set of techniques used by social scientists to study the forma...
To the extent that we permit data mining programs to proceed, they must provide adequate due process...
There is a growing trend of disturbed individuals expressing their unhappiness with elements of gove...
This research is in threat analysis and countermeasures employing Artificial Intelligence (AI) metho...
Most communication in the modern era takes place over some type of cyber network, to include telecom...
Open Source Intelligence using social media is a practice which gives military intelligence analysts...
abstract: In September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and m...
The development of new information and communication technologies increased the volume of informati...
The majority of research on covert networks uses social network analysis (SNA) to determine critical...