Contact Us

For Marketing, Sales and Subscriptions Inquiries
2637 E Atlantic Blvd #43110
Pompano Beach, FL 33062
USA

Conference List

50th International Scientific Conference on Electrical, Computer, Electronics and Engineering
Vennue: Hotel Grand Flora Dubai, UAE Al- Rigga Road Deira , Near Al-Rigga Metro station , Deira Dubai UAE
Date: 20-Dec-2018
More Details

5th International Academic Conference on Computer Sciences and Technological Advancement
Vennue: Hotel Istana Kuala Lumpur City Centre 73 Jalan Raja Chulan, Kuala Lumpur, 50200, Malaysia
Date: 29-Dec-2018
More Details

Journal of Information

December 2015, Volume 1, 2, pp 59-70

Big Data in Homeland Security

Lidong Wang, Cheryl Ann Alexander

Lidong Wang 1

Cheryl Ann Alexander 2

  1. Department of Engineering Technology, Mississippi Valley State University, USA 1

  2. Technology and Healthcare Solutions, Inc., USA 2

Pages: 59-70

DOI: 10.18488/journal.104/2015.1.2/104.2.59.70

Share :


Abstract:

Big Data predicts outcomes and has great impacts on knowledge discovery and value creation. It can be used to fight against terrorism and enhance Homeland Security by providing accurate predictions and patterns of terrorist activities. This paper introduces some methods and technologies used in Homeland Security. They are: biometrics, radio frequency identification (RFID), data mining, cloud computing, and Big Data. Big Data applications in Homeland Security are presented. These applications include Big Data in general security and public safety, crime prediction and aviation security, disasters, and cybersecurity and cyber defense. Big Data challenges in security are also discussed.
Contribution/ Originality
This study contributes in the existing literature and presents technology progress and applications of Big Data in Homeland Security, especially in cybersecurity and cyber defense.

Keywords:


Video:

Reference:

  1. H. C. Chen, R. H. L. Chiang, and V. C. Storey, "Business intelligence and analytics: From big data to big impact," MIS Quarterly, vol. 36, pp. 1165-1188, 2012.
  2. K. M. Deitz, "Critical infrastructure protection," Journal of Healthcare Protection Management, vol. 28, pp. 101-113, 2012.
  3. M. M. Neag, "Critical infrastructure protection-the foundation of national security 2," Buletin Stiintific, vol. 19, pp. 126-132, 2014.
  4. A. P?trascu and E. Simion, "Critical infrastructures cyber protection using kernel based supervised learning techniques," MTA Review, Military Technical Academy (MTA) Publishing House, vol. 24, pp. 59-66, 2014.
  5. B. Thomas, S. Fernandez, and T. Wilbanks, "Perspectives on improving resilience for critical infrastructures," The Global Forum on Urban and Regional Resilience at Virginia Tech: New Perspectives on Resilience, Blacksburg, Virginia, USA, October 12-14, 2014.
  6. G. H. Kim, S. Trimi, and J. H. Chung, "Big-Data applications in the government sector," Communications of the ACM, vol. 57, pp. 78-85, 2014.
  7. L. D. Wang, "Enhanced homeland security based on biometrics and RFID," International Journal of Computer Applications in Technology, vol. 44, pp. 37-45, 2012.
  8. C. Blundo, E. D. Cristofaro, and P. Gasti, "Espresso: Efficient privacy-preserving evaluation of sample set similarity," Journal of Computer Security, vol. 22, pp. 355–381, 2014.
  9. R. Karl and B. Chris, "Facial Analytics: From Big Data to Law Enforcement, IEEE COMPUTER, Sept. 2012, at 95; see also Evgeny Morozov, Requiem for Our Wonderfully Inefficient World, SLATE, Apr. 26, 2013." Available http://www.slate.com/articles/technology/future_tense/2013/04/senor_based_dynamic_pricing_may_be_efficient_but_it_could_create_inequality.html, 2012.
  10. W. Jeberson and L. Sharma, "Survey on big data for counter terrorism," International Journal of Innovations & Advancement in Computer Science, vol. 4, pp. 197-205, 2015.
  11. Z. U. H. Usmani, "Predictive modeling to counter terrorist attacks," Brown Journal of World Affairs, vol. 20, pp. 277-284, 2014.
  12. J. Bartlett and C. Miller, "The state of the art: A literature review of social media intelligence capabilities for counter-terrorism," Demos, Technical Report, London, UK, 2013.
  13. S. R. Srinivasan and S. R. M. Chandrasekeran, "Big data on terrorist attacks: An analysis using the ensemble classifier approach," presented at the International Conference on Inter Disciplinary Research in Engineering and Technology, New Delhi, India, 2015.
  14. D. Verton, "How data will revolutionize aviation security," Homeland Security Today Magazine,vol. 5, pp. 30-33, 2013.
  15. M. Hilbert, "Big data for development: From information- to knowledge societies (January 15, 2013)." Available http://ssrn.com/abstract=2205145 or http://dx.doi.org/10.2139/ssrn.2205145 [Accessed October 30, 2014], 2013.
  16. K. Grolinger, E. Mezghani, M. A. M. Capretz, and E. Exposito, "Knowledge as a service framework for disaster data management," Electrical and Computer Engineering Publications, vol. 25, pp. 1-6, 2013.
  17. M. Chen, S. W. Mao, and Y. H. Liu, "Big data: A survey," Mobile Netw Appl., vol. 19, pp. 171–209, 2014.
  18. D. Grinshpan, "Live streaming: Powering continuous monitoring through big data - A candid survey of federal employees," Research Report, Government Business Council, Brocade Networking Solutions, 2013.
  19. Ponemon Institute, "Big data analytics in cyber defense," Research Report, EB-7499 02.13, 2013.
  20. A. A. Cárdenas, P. K. Manadhata, and S. P. Rajan, "Big data analytics for security," IEEE Security & Privacy, vol. 11, pp. 74-76, 2013.
  21. T. A. Baklanoff and A. A. Padath, "Usability, security and healthcare systems: Design, challenges and perspectives," Journal of Information Assurance and Security, vol. 7, pp. 366-376, 2012.
  22. U.S. Department of Defense, Strategy for operating in cyberspace. Washington, DC, USA: Department of Defense, 2011.
  23. A. Flowers and S. Zeadally, "US policy on active cyber defense," Homeland Security & Emergency Management, vol. 11, pp. 289–308, 2014.
  24. D. E. O’Leary, "Artificial intelligence and big data," IEEE Intelligent Systems, vol. 28, pp. 96-99, 2013.
  25. C. Q. Ji, Y. Li, W. M. Qiu, U. Awada, and K. Q. Li, "Big data processing in cloud computing environments," presented at the 2012 International Symposium on Pervasive Systems, Algorithms and Networks, San Marcos, Texas, USA, December 13-15, 2012.
  26. V. Gadepally, B. Hancock, B. Kaiser, J. Kepner, P. Michaleas, M. Varia, and A. Yerukhimovich, "Computing on masked data to improve the security of big data," presented at the The 2015 IEEE Symposium on Technologies for Homeland Security (HST’15), Greater Boston, Massachusetts, 2015.
  27. Y. A. Younis, M. Merabti, and K. Kifayat, "Secure cloud computing for critical infrastructure: A survey," presented at the The 14th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNet 2013), Liverpool, UK, July 24-25, 2013.

Statistics:

Google Scholor ideas Microsoft Academic Search bing Google Scholor

Funding:

Competing Interests:

Acknowledgement:


Related Article