2009
DOI: 10.1007/978-3-642-04441-0_40
|View full text |Cite
|
Sign up to set email alerts
|

Semantic Knowledge Representation in Terrorist Threat Analysis for Crisis Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 1 publication
0
4
0
1
Order By: Relevance
“…for representing terrorism events [16]; • An ontology for uncovering terrorism-related hidden semantic associations, which was the result of knowledge fusion from several existing ontologies and open knowledge systems, like, e.g., the Global Terrorism Database [11].…”
Section: Related Workmentioning
confidence: 99%
“…for representing terrorism events [16]; • An ontology for uncovering terrorism-related hidden semantic associations, which was the result of knowledge fusion from several existing ontologies and open knowledge systems, like, e.g., the Global Terrorism Database [11].…”
Section: Related Workmentioning
confidence: 99%
“…Its role in natural, societal, and technical processes is acute [ 4 , 6 , 31 , 32 , 33 ]. The detection and representation of real-world events and information has been addressed in and applied in domain such as system safety [ 11 , 12 , 34 ], cyber security [ 35 , 36 , 37 ], and counter-terrorism [ 38 , 39 ]. Recent advances in intelligent physical systems (IPS) have also raised the need for models for self- and environment-perception, observation, and activation, especially in the domains of microbiology and biochemistry [ 40 ].…”
Section: Related Workmentioning
confidence: 99%
“…Several studies have referred to precise real-world event and information detection, with applications in system safety [16], cyber security [17], and counter-terrorism [18], [19]. These occurrences of PIED are typical; they have in common the criticality of identifying threats or emergency situations by software agents embedded in large technical, organizational, or socio-technical systems.…”
Section: Physical-informatical Essence Dualitymentioning
confidence: 99%