Back to Search
Start Over
Computational approaches to suspicion in adversarial settings
- Source :
- Information Systems Frontiers. 13:21-31
- Publication Year :
- 2010
- Publisher :
- Springer Science and Business Media LLC, 2010.
-
Abstract
- Intelligence and law enforcement agencies collect large datasets, but have difficulty focusing analyst attention on the most significant records and structures within them. We address this problem using suspicion, which we interpret as relevant anomaly, as the measure associated with data records and individuals. For datasets collected about widespread activities in which the signs of adversarial activity are rare, we suggest ways to build predictive models of suspicion. For datasets collected as the result of lawful interception, we suggest a model of suspicion spreading using the social network implied by the intercepted data.
- Subjects :
- Data records
ComputingMilieux_THECOMPUTINGPROFESSION
Social network
Computer Networks and Communications
business.industry
Computer science
Law enforcement
Difficulty focusing
Computer security
computer.software_genre
Data science
Theoretical Computer Science
Adversarial system
Lawful interception
business
computer
Software
Information Systems
Subjects
Details
- ISSN :
- 15729419 and 13873326
- Volume :
- 13
- Database :
- OpenAIRE
- Journal :
- Information Systems Frontiers
- Accession number :
- edsair.doi...........547b4d801f6b2b94baf974241bb6746f
- Full Text :
- https://doi.org/10.1007/s10796-010-9279-4