Mining Technologies for the Security of European Citizens Marie-Francine Moens Department of Computer Science Katholieke Universiteit Leuven, Belgium.

Slides:



Advertisements
Similar presentations
1 MEDIA LITERACY IN THE AGE OF THE INTERNET Roger Darlington Chair, Internet Watch Foundation Member, Ofcom Consumer Panel Ofcom/ippr conference London,
Advertisements

1 Automatic Indexing with the EuroVoc Thesaurus Enabling Cross-lingual Search Marie Francine Moens Katholieke Universiteit Leuven, Belgium Frane Šarić
G.W ICT for risk management FP6 Strategic Objective ICT for Environment Information Society & Media DG European Commission, Brussels Guy Weets Deputy.
10 Oct Creation of lead markets in ICT Public procurement of Security solutions Mr. G. Barontini.
Bringing It All Together: An Academic Viewpoint (What is needed and what is likely to come next?) Association of Information and Dissemination Centers.
1 Mobile Applications and Web Services Part II Prof. Klaus Moessner, Dr Payam Barnaghi Centre for Communication Systems Research Electronic Engineering.
Information Society Technologies Third Call for Proposals Norbert Brinkhoff-Button DG Information Society European Commission Key action III: Multmedia.
Knowledge information public value capability capacity BIM co-design content credibility susceptibility leadership innovation community records attention.
Distributed search for complex heterogeneous media Werner Bailer, José-Manuel López-Cobo, Guillermo Álvaro, Georg Thallinger Search Computing Workshop.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 3.
Paul Vanbosterhaut Managing Director, Vircom Europe January 2007 ModusGate™ 4.4 Smart Assurance Gateway Not Just Warmed-over Open Source Technology…
A Stepwise Modeling Approach for Individual Media Semantics Annett Mitschick, Klaus Meißner TU Dresden, Department of Computer Science, Multimedia Technology.
Annie Lalé of SQUARIS  FP7 Themes Relevant for Safety and Security  Focus of Research Projects in Emergency and Disaster Management  ICT Themes in FP7.
Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl 4 th call FP7-SEC Seventh Framework Programme
Help communities share knowledge more effectively across the language barrier Automated Community Content Editing PorTal.
Prof. Vincenzo Cuomo Italian National Council of Research Institute of Methodologies for Environmental Analysis Topic FCT-10 Urban Security topic 1: Innovative.
Machine Learning and Data Mining Course Summary. 2 Outline  Data Mining and Society  Discrimination, Privacy, and Security  Hype Curve  Future Directions.
Data warehouse example
Semantic Web and Web Mining: Networking with Industry and Academia İsmail Hakkı Toroslu IST EVENT 2006.
Computing ESSENTIALS     CHAPTER Ch 9Copyright 2003 The McGraw-Hill Companies, Inc Graphics, Multimedia, and Artificial Intelligence computing.
ONTOLOGY-BASED INTERNATIONAL DEGREE RECOGNITION Vagan Terziyan, Olena Kaykova University of Jyväskylä, Finland Oleksandra Vitko, Lyudmila Titova (speaker)
ICAIL 2007 DESI Workshop Panel presentation Marie-Francine Moens Centre for Law and ICT/ Department of Computer Science Katholieke Universiteit Leuven,
An Open Source Environment to construct Information Services for Children.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
LLNL-PRES This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344.
BPM based robust e-business application development.
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Semantic web technologies for secure interoperability and.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Data Management Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition.
Knowledge management exercise GROUP 2 Melisides Konstantinos Konstantinidou Angeliki Evgenidis Nikos
revised CmpE 583 Fall 2006Discussion: OWL- 1 CmpE 583- Web Semantics: Theory and Practice DISCUSSION: OWL Atilla ELÇİ Computer Engineering.
Page 1 WEB MINING by NINI P SURESH PROJECT CO-ORDINATOR Kavitha Murugeshan.
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
The Yellow Group Design Informatics (Regli, Stone, Kusiak, Leifer, Gupta, Chung, Fenves, Law, Kopena)
The role of Parthenos for CLARIN ERIC Steven Krauwer CLARIN ERIC Executive Director 1.
INFO Week 10 Futures of IR Systems Dr. Xia Lin Assistant Professor College of Information Science and Technology Drexel University.
1 Controversial Issues  Data mining (or simple analysis) on people may come with a profile that would raise controversial issues of  Discrimination 
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Fahimeh Tabatabaei, Reza Naserzadeh, Simeon Yates, Babak Akhgar, Eleanor Lockley, David Fortune Chapter 8.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Themes Architecture Content Metadata Interoperability Standards Knowledge Organisation Systems Use and Users Legal and Economic Issues The Future.
Subtask 1.8 WWW Networked Knowledge Bases August 19, 2003 AcademicsAir force Arvind BansalScott Pollock Cheng Chang Lu (away)Hyatt Rick ParentMark (SAIC)
Working Together To Protect Public Health: The Public Health Communications Infrastructure May 23, 2006 Janet B. Stevens Director, Management Controls.
Data Mining By Dave Maung.
Ihr Logo Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization Turban, Aronson, and Liang.
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
Mining real world data Web data. World Wide Web Hypertext documents –Text –Links Web –billions of documents –authored by millions of diverse people –edited.
The Knowledge Grid Methodology  Concepts, Principles and Practice Hai Zhuge China Knowledge Grid Research Group Chinese Academy of Sciences.
Data Mining: Knowledge Discovery in Databases Peter van der Putten ALP Group, LIACS Pre-University College LAPP-Top Computer Science February 2005.
ICT-enabled Agricultural Science for Development Scenarios, Opportunities, Issues by ICTs transforming agricultural science, research & technology generation.
Contact : Bernadette Bouchon-Meunier, Patrick Gallinari, Jean-Gabriel Ganascia LIP6, UPMC, 8 rue du Capitaine Scott, Paris, France
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Overview of the Animation Industry Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
21-Nov-06Food and Agriculture Organization of the United Nations Requirements for a Knowledge Infrastructure at FAO Case Study: FAO country profiles and.
NC-BSI: TASK 3.5: Reduction of False Alarm Rates from Fused Data Problem Statement/Objectives Research Objectives Intelligent fusing of data from hybrid.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Slide no 1 Cognitive Systems in FP6 scope and focus Colette Maloney DG Information Society.
European Commission Enterprise and Industry Marco Malacarne | European Parliament 12 May 2010 | ‹#› European Commission Enterprise and Industry Marco Malacarne.
A New Generation of Artificial Neural Networks.  Support Vector Machines (SVM) appeared in the early nineties in the COLT92 ACM Conference.  SVM have.
OFFICIAL Horizon 2020 Secure Societies Home Office Perspective Tim Cook
1© 2015 IBM Corporation Unlocking the power of the API economy Client Briefing Nov.
Horizon 2020 Secure Societies Secure Societies Briefing Day 21 January /06/2016.
Data Mining - Introduction Compiled By: Umair Yaqub Lecturer Govt. Murray College Sialkot.
Taking a Tour of Text Analytics
1st Draft for Defining IoT (1)
What is Pattern Recognition?
Data Warehousing and Data Mining
Frontiers of Computer Science, 2015, 9(6):980–989
Module 7 Questions Prepared by Mr O Seguna next.
Course Summary ChengXiang “Cheng” Zhai Department of Computer Science
Open Source SUMMA Platform
Presentation transcript:

Mining Technologies for the Security of European Citizens Marie-Francine Moens Department of Computer Science Katholieke Universiteit Leuven, Belgium

23/9/10SRC'102 Status Text mining, natural language understanding, recognition of content in multimedia...: –Opportunities to monitor information Web content Secured information...

23/9/10SRC'103 Status –Opportunities to search, mine and fuse information: To discover trends and patterns For decision making, prediction, analysis and intervention

23/9/10SRC'104 Examples of applications Protection of citizens for harmful content: –Webpages (e.g., protect children - PuppyIR EU FP7) –Spam and phishing mails (e.g., protect citizens, AntiPhish EU FP6) –False information (e.g., protect customers) –Defamation (e.g., protect companies, individuals) Protection of groups: –Intelligent surveillance (e.g., video surveillance) Wikia.com

23/9/10SRC'105 Examples of applications Protection of European companies: –Against industrial espionage, unlawful copying Protection of nations: –Against terrorist groups –Restoring security at moments of crisis: fusion, filtering and generation of information Dit probleem is ondertussen opgelost en je kan de mail opnieuw sturen. Niet alle uitgaande mails zijn geweigerd, het gaat in totaal over 700 mails en je krijgt later een bericht AP / Brynjar Gauti

23/9/10SRC'106 Issues Recognition of content: but –Heterogeneous sources, different languages, media –Fraudulent scams cloak content –Fraudulent scams change strategies continuously –Content can be unreliable (credibility) Can you trust it?

23/9/10SRC'107 Issues Linking of content: –Interoperability, integration, interconnectability –Linking based on low-level features

23/9/10SRC'108 Needs ICT –Robust and reliable extractors (text, speech, images, video...) –Robust and reliable linking technologies (connecting the dots...) Includes also disambiguation –Adaptable to different languages and media with minimum of human intervention –At system level: interoperability

23/9/10SRC'109 Response ICT Technologies: –Knowledge methodologies maturing: ontologies, semantics, machine learning, data/text/graph mining, joint classification, alignment,... –Probabilistic models for reasoning –Latent class models for discovering hidden semantics FP7: European Security Research programme: –Develop technologies and knowledge to ensure security of citizens from threats such as terrorism, (organised) crime, natural disasters and industrial accidents