Back to Search Start Over

Computational approaches to suspicion in adversarial settings

Authors :
David B. Skillicorn
Source :
Information Systems Frontiers. 13:21-31
Publication Year :
2010
Publisher :
Springer Science and Business Media LLC, 2010.

Abstract

Intelligence and law enforcement agencies collect large datasets, but have difficulty focusing analyst attention on the most significant records and structures within them. We address this problem using suspicion, which we interpret as relevant anomaly, as the measure associated with data records and individuals. For datasets collected about widespread activities in which the signs of adversarial activity are rare, we suggest ways to build predictive models of suspicion. For datasets collected as the result of lawful interception, we suggest a model of suspicion spreading using the social network implied by the intercepted data.

Details

ISSN :
15729419 and 13873326
Volume :
13
Database :
OpenAIRE
Journal :
Information Systems Frontiers
Accession number :
edsair.doi...........547b4d801f6b2b94baf974241bb6746f
Full Text :
https://doi.org/10.1007/s10796-010-9279-4