11/05/05SMU Homecoming1 DATA MINING AND TERRORISM Margaret H. Dunham CSE Department Southern Methodist University Dallas, Texas 75275

Slides:



Advertisements
Similar presentations
- A Powerful Computing Technology Department of Computer Science Wayne State University 1.
Advertisements

Supporting End-User Access
2008 © ChengXiang Zhai Dragon Star Lecture at Beijing University, June 21-30, Introduction to IR Research ChengXiang Zhai Department of Computer.
SAS solutions SAS ottawa platform user society nov 20th 2014.
2/25/13 - Union University 1 ADVENTURES IN DATA MINING Margaret H. Dunham Southern Methodist University Dallas, Texas This material.
Tacit Knowledge Mining John Canny Computer Science Division UC Berkeley.
© Prentice Hall1 DATA MINING TECHNIQUES Introductory and Advanced Topics Eamonn Keogh (some slides adapted from) Margaret Dunham Dr. M.H.Dunham, Data Mining,
© Prentice Hall1 DATA MINING Introductory and Advanced Topics Part II Margaret H. Dunham Department of Computer Science and Engineering Southern Methodist.
Knowledge Discovery Centre: CityU-SAS Partnership 1 Speakers: Prof Y V Hui, CityU Dr H P Lo, CityU Dr Sammy Yuen, CityU Dr K W Cheng, SAS Institute Mr.
7/10/07 - SEDE'07 1 DATA MINING APPLICATIONS Margaret H. Dunham Southern Methodist University Dallas, Texas This material is based.
9-1 Supporting Management and Decision Making 9-2 The Managers and Decision Making The Manager’s job Manager decisions and computerized support Modeling.
DASHBOARDS Dashboard provides the managers with exactly the information they need in the correct format at the correct time. BI systems are the foundation.
Introduction to Data Mining Data mining is a rapidly growing field of business analytics focused on better understanding of characteristics and.
Science Inquiry Minds-on Hands-on.
Mining Large Data at SDSC Natasha Balac, Ph.D.. A Deluge of Data Astronomy Life Sciences Modeling and Simulation Data Management and Mining Geosciences.
DATA MINING Part I IIIT Allahabad Margaret H. Dunham Department of Computer Science and Engineering Southern Methodist University Dallas, Texas 75275,
Understanding Data Analytics and Data Mining Introduction.
Southern Methodist University
Web Technologies COMP6115 Session 2: Planning, Designing, Constructing and Testing Static Web Sites Dr. Paul Walcott Department of Computer Science, Mathematics.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
CSE Data Mining, 2002Lecture 11.1 Data Mining - CSE5230 Web Mining CSE5230/DMS/2002/11.
2009 IEEE Symposium on Computational Intelligence in Cyber Security 1 LDA-based Dark Web Analysis.
Data Mining – A First View Roiger & Geatz. Definition Data mining is the process of employing one or more computer learning techniques to automatically.
Machine Learning Lecture 1. Course Information Text book “Introduction to Machine Learning” by Ethem Alpaydin, MIT Press. Reference book “Data Mining.
Knowledge Discovery from Mobile Phone Communication Activity Data Streams Fergal Walsh Data Stream Research presented in this poster was funded by a Strategic.
World-class engineering through learning, discovery, and engagement College of Engineering STAFF TOWN HALL 1.Update 2.Discussions Nov 2014.
Planned Giving Design Center Provided by: Rochester Area Community Foundation.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
Open Systems and Electronic Commerce
Chapter 5: Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization DECISION SUPPORT SYSTEMS AND BUSINESS.
CSE 5331/7331 F'071 CSE 5331/7331 Fall 2007 Image Mining Margaret H. Dunham Department of Computer Science and Engineering Southern Methodist University.
Image & Advancement 2nd Annual Progress Report. Image Enhancement 1. Prepare a long-range marketing plan 2. Communicate the Western Advantage to existing.
CSE 8331 Spring CSE 8331 Spring 2010 Image Mining Margaret H. Dunham Department of Computer Science and Engineering Southern Methodist University.
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
CSE 5331/7331 F'07© Prentice Hall1 CSE 5331/7331 Fall 2007 Machine Learning Margaret H. Dunham Department of Computer Science and Engineering Southern.
07/03/06 - Tunisia1 ME Data Mining Research at SMU Margaret H. Dunham, DBGroup: Yu Meng, Jie Huang, Lin Lu, Donya Quick, Michael Pierce CSE Department.
Helping Teachers Get IT!. IT is Not Just About Technology Reprinted with special permission of King Features Syndicate Copyright 1999.
CSE 5331/7331 F'071 CSE 5331/7331 Fall 2007 Dimensional Modeling Margaret H. Dunham Department of Computer Science and Engineering Southern Methodist University.
CSE 5331/7331 F'07© Prentice Hall1 CSE 5331/7331 Fall 2007 Regression Margaret H. Dunham Department of Computer Science and Engineering Southern Methodist.
Connecting Teachers Can there be models of effective practice and would they threaten innovation and diversity? Chair: Christine Vincent, Becta Presenter:
1 Professional Communications Employ Me Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
Waqas Haider Bangyal. 2 Source Materials “ Data Mining: Concepts and Techniques” by Jiawei Han & Micheline Kamber, Second Edition, Morgan Kaufmann, 2006.
Data Mining in Germany IIM Conference, Oct. 24, 2012 Gottfried Schwarz, DLR > Lecture > Author Document > Datewww.DLR.de Chart 1.
1 SBM411 資料探勘 陳春賢. 2 Lecture I Class Introduction.
Chapter 3 Building Business Intelligence Chapter 3 DATABASES AND DATA WAREHOUSES Building Business Intelligence 6/22/2016 1Management Information Systems.
Business Strategy MGT 401 Welcome to Spring 2016.
Data Mining: Confluence of Multiple Disciplines Data Mining Database Systems Statistics Other Disciplines Algorithm Machine Learning Visualization.
Management Science Chapter 1
Business Intelligence Minor
DATA MINING Spatial Clustering
DATA MINING Introductory and Advanced Topics Part III – Web Mining
DATA MINING © Prentice Hall.
School of Computer Science & Engineering
Introduction to IR Research
Hierarchy of Data in a Database
Web Mining Ref:
Prediction as Data Mining Task
DATA ANALYTICS AND TEXT MINING
Performing CS Research
Experiences with Business Analytics Curriculum Implementation
CSc4730/6730 Scientific Visualization
DATA MINING Introductory and Advanced Topics Part II - Clustering
Supporting End-User Access
Mathematical Models: Building Functions
Dept. of Computer Science University of Liverpool
Discovery of Significant Usage Patterns from Clickstream Data
Information Retrieval and Web Design
Information Technology
Welcome! Knowledge Discovery and Data Mining
The Graph of a Rational Function
Presentation transcript:

11/05/05SMU Homecoming1 DATA MINING AND TERRORISM Margaret H. Dunham CSE Department Southern Methodist University Dallas, Texas /5/05 This material is based upon work supported by the National Science Foundation under Grant No

11/05/05SMU Homecoming2 Data Mining Introductory and Advanced Topics, by Margaret H. Dunham, Prentice Hall, DILBERT reprinted by permission of United Feature Syndicate, Inc.

11/05/05SMU Homecoming3 OBJECTIVE Explore the use of data mining techniques in identifying terrorists and criminals.

11/05/05SMU Homecoming4 Data Mining nFinding hidden information in a database nFit data to a model nSimilar terms n Exploratory data analysis n Data driven discovery n Deductive learning n Knowledge Discovery in Databases

11/05/05SMU Homecoming5 PROBLEMS nNot well defined nNot enough historical data nAlgorithms not well suited Select name From Where job = Emp “Programmer” ??? “Terrorist”

11/05/05SMU Homecoming6 FBI FBI Strategic Focus 1.html “Substantially enhance analytical capabilities with personnel and technology” “Expand use of data mining, financial record analysis, and communications analysis to combat terrorism”

11/05/05SMU Homecoming7

11/05/05SMU Homecoming8 But it isn’t Magic nYou must know what you are looking for nYou must know how to look for you Suppose you knew that a specific cave had gold: What would you look for? How would you look for it? Might need an expert miner

11/05/05SMU Homecoming9 Dallas Morning News October 7, 2005

11/05/05SMU Homecoming10

11/05/05SMU Homecoming11 BIG BROTHER ? nTotal Information Awareness n n n hp?id=0 hp?id=0 n n nTerror Watch List n r.htm r.htm n 511_8047_tc_210.htm 511_8047_tc_210.htm n n

11/05/05SMU Homecoming12 “If it looks like a duck, walks like a duck, and quacks like a duck, then it’s a duck.” Description BehaviorAssociations Classification Clustering Link Analysis (Profiling) (Similarity) “If it looks like a terrorist, walks like a terrorist, and quacks like a terrorist, then it’s a terrorist.”

11/05/05SMU Homecoming13

11/05/05SMU Homecoming14 For a Terrorist, Similarity with What??? Distance from What??? nTypically distance from a representative of that class. nA known terrorist? nTSA n y_failures/ y_failures/ n G1683.cfm G1683.cfm n ps_scrapped/ ps_scrapped/ n

11/05/05SMU Homecoming15 “Proof” that Bin Laden was involved in 9/11 nhttp:// oof_of_saddam.htmhttp:// oof_of_saddam.htm

11/05/05SMU Homecoming16 Jialun Qin, Jennifer J. Xu, Daning Hu, Marc Sageman and Hsinchun Chen, “Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network” Lecture Notes in Computer Science, Publisher: Springer-Verlag GmbH, Volume 3495 / 2005, p. 287.

11/05/05SMU Homecoming17