eprintid: 592 rev_number: 2 eprint_status: archive userid: 1 dir: disk0/00/00/05/92 datestamp: 2023-11-09 15:48:44 lastmod: 2023-11-09 15:48:44 status_changed: 2023-11-09 15:22:46 type: conference_item metadata_visibility: show creators_name: Zamin, N. title: Information extraction for counter-terrorism: A survey ispublished: pub keywords: Counter terrorism; Data gathering and analysis; Information Extraction; Information processing; Internet usage; Link grammar; Potential threats; September 11; Surveillance data; Technical challenges, Artificial intelligence; Data processing; Image processing; Information analysis; Surveys, Terrorism note: cited By 7; Conference of Computation World: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns, ComputationWorld 2009 ; Conference Date: 15 November 2009 Through 20 November 2009; Conference Code:79871 abstract: The awareness of terrorism has increased since the event of the September 11 in the U.S. It has focused the spotlight on the absence of information available about terrorism. The fight against terrorism has trigger new effort to find better approaches to intelligence data gathering and analysis. Generally, a major activity in counter-terrorism is the ability to process high-volumes of data using various Artificial Intelligence (AI) techniques to identify potential threats. Recently, there has been a huge increase in the amount of intelligence-surveillance data literature. However, it so difficult to gain access to relevant data when the data are scattered in different departments and exist in many forms such as phone tap scripts, internet usage logs, emails, seized hard-drive, CCTV video, images, etc. In this paper, a survey is presented on the technical challenges in extracting terrorism data and sets forth several significant approaches to these technical challenges. The performance by each reviewed approaches in counter terrorism and other domains is evaluated. The potential of using Link Grammar (LG) in information processing is also explored. © 2009 IEEE. date: 2009 official_url: https://www.scopus.com/inward/record.uri?eid=2-s2.0-77951006019&doi=10.1109%2fComputationWorld.2009.105&partnerID=40&md5=96736d4930e60dd684e82bf971fce69f id_number: 10.1109/ComputationWorld.2009.105 full_text_status: none publication: Computation World: Future Computing, Service Computation, Adaptive, Content, Cognitive, Patterns, ComputationWorld 2009 place_of_pub: Athens pagerange: 520-526 refereed: TRUE isbn: 9780769538624 citation: Zamin, N. (2009) Information extraction for counter-terrorism: A survey. In: UNSPECIFIED.