<--- Back to Details
First PageDocument Content
Surveillance / Information Awareness Office / Multistate Anti-Terrorism Information Exchange / Government / John Poindexter / Data quality / Text mining / Web mining / Science / Data analysis / Data mining
Date: 2012-01-04 10:25:38
Surveillance
Information Awareness Office
Multistate Anti-Terrorism Information Exchange
Government
John Poindexter
Data quality
Text mining
Web mining
Science
Data analysis
Data mining

Data Mining and Homeland Security: An Overview

Add to Reading List

Source URL: www.au.af.mil

Download Document from Source Website

File Size: 130,56 KB

Share Document on Facebook

Similar Documents

Computing / SIGCOMM / Computer science / ACM/IEEE Supercomputing Conference / Information and communications technology / Information-centric networking / Don Towsley

DR. ALBERTO DAINOTTI Assistant Research Scientist, Center for Applied Internet Data Analysis (CAIDA) San Diego Supercomputer Center, University of California San Diego http://www.caida.org/~alberto/ ---

DocID: 1xVLA - View Document

Internet architecture / Computing / Internet / Network architecture / Border Gateway Protocol / BGP hijacking / Route Views / Autonomous system / Routing / Router / Multihoming / Computer network

BGPStream: A Software Framework for Live and Historical BGP Data Analysis Chiara Orsini 1 , Alistair King1 , Danilo Giordano2 , Vasileios Giotsas1 , Alberto Dainotti1 1 CAIDA, UC San Diego 2

DocID: 1xVAn - View Document

ETH Domain / cole Polytechnique Fdrale de Lausanne / Education in Switzerland / Higher education

MyBion Our service uses nanopore DNA sequencing coupled with real-time data analysis to help infectious disease patients. We offer physicians a better way to reach

DocID: 1xUOj - View Document

AnyChart / Petroleum production / Computing / Wellsite information transfer standard markup language / Visualization / Data visualization / Application software / Communication design

AnyChartâ„¢ Data Visualization Solutions IDS Chooses AnyChart for Its Reporting and Analysis Systems Independent Data Services

DocID: 1xUb6 - View Document

Mathematics / Electromagnetism / Electric power / Electrical engineering / Power engineering / Power-flow study / Parameter / Variable

Automated Vulnerability Analysis of AC State Estimation under Constrained False Data Injection in Electric Power Systems Sicun Gao1 , Le Xie2 , Armando Solar-Lezama1 , Dimitrios Serpanos3 , and Howard Shrobe1 Abstract—

DocID: 1xU8c - View Document