DATA MINING AND TERRORISM. Margaret H. Dunham CSE Department Southern Methodist University Dallas, Texas 75275 [email protected] 11/5/05 This material is based upon work supported by the National Science Foundation under Grant No. 9820841.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Data Mining Introductory and Advanced Topics, by Margaret H. Dunham, Prentice Hall, 2003.
DILBERT reprinted by permission of United Feature Syndicate, Inc.
Explore the use of data mining techniques in identifying terrorists and criminals.
Where job =
FBI Strategic Focus
“Substantially enhance analytical capabilities with personnel and technology”
“Expand use of data mining, financial record analysis, and communications analysis to combat terrorism”
Suppose you knew that a specific cave had gold:
October 7, 2005
“If it looks like a terrorist, walks like a terrorist, and quacks like a terrorist, then it’s a terrorist.”
“If it looks like a duck, walks like a duck, and quacks like a duck, then it’s a duck.”
Classification Clustering Link Analysis
Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman and Hsinchun Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network” Lecture Notes in Computer Science, Publisher: Springer-Verlag GmbH, Volume 3495 / 2005 , p. 287.
Thank You Hsinchun Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network”