eprintid: 592
rev_number: 2
eprint_status: archive
userid: 1
dir: disk0/00/00/05/92
datestamp: 2023-11-09 15:48:44
lastmod: 2023-11-09 15:48:44
status_changed: 2023-11-09 15:22:46
type: conference_item
metadata_visibility: show
creators_name: Zamin, N.
title: Information extraction for counter-terrorism: A survey
ispublished: pub
keywords: Counter terrorism; Data gathering and analysis; Information Extraction; Information processing; Internet usage; Link grammar; Potential threats; September 11; Surveillance data; Technical challenges, Artificial intelligence; Data processing; Image processing; Information analysis; Surveys, Terrorism
note: cited By 7; Conference of Computation World: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns, ComputationWorld 2009 ; Conference Date: 15 November 2009 Through 20 November 2009; Conference Code:79871
abstract: The awareness of terrorism has increased since the event of the September 11 in the U.S. It has focused the spotlight on the absence of information available about terrorism. The fight against terrorism has trigger new effort to find better approaches to intelligence data gathering and analysis. Generally, a major activity in counter-terrorism is the ability to process high-volumes of data using various Artificial Intelligence (AI) techniques to identify potential threats. Recently, there has been a huge increase in the amount of intelligence-surveillance data literature. However, it so difficult to gain access to relevant data when the data are scattered in different departments and exist in many forms such as phone tap scripts, internet usage logs, emails, seized hard-drive, CCTV video, images, etc. In this paper, a survey is presented on the technical challenges in extracting terrorism data and sets forth several significant approaches to these technical challenges. The performance by each reviewed approaches in counter terrorism and other domains is evaluated. The potential of using Link Grammar (LG) in information processing is also explored. © 2009 IEEE.
date: 2009
official_url: https://www.scopus.com/inward/record.uri?eid=2-s2.0-77951006019&doi=10.1109%2fComputationWorld.2009.105&partnerID=40&md5=96736d4930e60dd684e82bf971fce69f
id_number: 10.1109/ComputationWorld.2009.105
full_text_status: none
publication: Computation World: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns, ComputationWorld 2009
place_of_pub: Athens
pagerange: 520-526
refereed: TRUE
isbn: 9780769538624
citation:   Zamin, N.  (2009) Information extraction for counter-terrorism: A survey.  In: UNSPECIFIED.