2006
DOI: 10.1109/msp.2006.147
|View full text |Cite
|
Sign up to set email alerts
|

Countering Terrorism through Information and Privacy Protection Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…In experiments conducted by DARPA, the ability of analysts to work counterterrorism problems was assessed, with and without the aid of new information technology tools (Popp & Poindexter 2006 ). SEAS was one of the tools employed.…”
Section: Evaluation Of Seasmentioning
confidence: 99%
“…In experiments conducted by DARPA, the ability of analysts to work counterterrorism problems was assessed, with and without the aid of new information technology tools (Popp & Poindexter 2006 ). SEAS was one of the tools employed.…”
Section: Evaluation Of Seasmentioning
confidence: 99%
“…Similar to a privacy appliance [8], an agent in the super-peer is a unique law-aware guardian that provides LaaS to its peers. The super-peer is also a trusted proxy of an SPD that provides a query interface between its peers and a user.…”
Section: Semantic Policy Infrastructurementioning
confidence: 99%
“…The key premise of behavioural pattern recognition is that, whether in an airport or a transit station, terrorists are there for a purpose that is irregular and that should manifest itself in their behaviour. Similarly, the key assumption of rule-based discovery is that terror plotting is a distinct type of activity and so there must be some form of expression in transactional data (Popp and Poindexter, 2006).…”
Section: Automated Detection Systemsmentioning
confidence: 99%