期刊文献+

基于大数据的反恐情报数据仓库体系结构设计 被引量:19

Design of the Architecture of Data Warehouse for Counter- terrorism Intelligence Based on Big Data
下载PDF
导出
摘要 [目的/意义]大数据背景下,反恐情报工作的深层次变革正在酝酿和发生。分析数据的相关性、发掘数据的深层次价值,是大数据反恐情报研究的关键。[方法/过程]在对大数据反恐情报、传统数据仓库体系结构相关理论研究的基础上,将大数据、反恐情报、数据仓库进行深层次融合,结合当前我国反恐情报数据库的现实问题,构建了以反恐情报主题数据库、反恐情报数据仓库为核心的基于大数据的反恐情报数据仓库体系结构。[结果/结论]通过对基于大数据的反恐情报数据仓库体系结构的构建,以期为我国反恐情报的信息化分析和服务决策能力提升提供技术支撑。 [ Purpose/Sigrtifieanee ] There is a fundamental change for the counter-terrorism intelligence work in the era of big data. Ana- lyzing the correlation of data and excavating the deep value of data are the key activities in the big data-based counter-terrorism intelli- gence research. [ Method/Process] On the basis of relevant theoretical studies of big data-based anti-terrorism intelligence and traditional data warehouse architecture, combining with the realistic problems currently existed in China, this article constructs a big data-based counter-terrorism intelligence data warehouse architecture with counter-terrorism intelligence subject database and counter-terrorism intelligence database as its cores. [ Results/Conclusion ] The study can provide technical support to China's counter-terrorism intelligence information analysis and service decision making ability improvement.
作者 瞿志凯 张婷
出处 《情报杂志》 CSSCI 北大核心 2016年第2期30-36,共7页 Journal of Intelligence
关键词 大数据 反恐情报 数据仓库 big data counter-terrorism intelligence data warehouse
  • 相关文献

参考文献9

  • 1李本先,张薇,梅建明,凌云翔.大数据在反恐情报工作中的应用研究[J].情报杂志,2014,33(12):1-5. 被引量:44
  • 2侯睿.大数据时代的反恐情报收集与分析[J].山东警察学院学报,2014,26(4):94-97. 被引量:35
  • 3万向阳.反恐行动情报分析系统大数据障碍及其改进[J].情报杂志,2015,34(5):7-10. 被引量:11
  • 4维克多·迈尔一舍恩伯格,肯尼迪·库克.大数据时代[M].杭州:浙江人民出版社,2013:39,75.
  • 5Big data [ EB/OL ]. [ 2015 - 10 - 24]. http ://en. wikipedia, org/ wiki/Big_ data.
  • 6Grobelnik M. Big-data Computing:Creating Revolutionary Bre- akthrou-ghs in Commerce, Science, and Society[ R/OL ]. [ 2015-10-24]. http://videolectures, net/eswc2012 grobelnik _big_data.
  • 7Barwick H. The" four Vs" of Big Data. Implementing Information Infrastructure Symposium [EB/OL ]. [ 2015 - 10 - 24 ]. http :// www. Computer- world, com. cn. au/article/396198/iiis four_ vs_big data.
  • 8梅建明.反恐情报与危机管理[M].北京:群众出版社,2007.
  • 9William H.Inmon.数据仓库[M].北京:机械工业出版社,2006.

二级参考文献32

  • 1梅建明.论反恐数据挖掘[J].中国人民公安大学学报(社会科学版),2007,23(2):24-29. 被引量:16
  • 2数据挖掘“无底洞”,http://tech.it168.com/db/t/2006-08-31/200608311741708.shtml.
  • 3Arquilla J, Ronfeldt D F. Networks and Netwars: the Future of Terror, Crime and Military [ R]. Santa Monica, California:RAND, 2001:20-24.
  • 4Krebs V. Mapping Networks of Terrorist Cells [ J ]. Connec- tions, 2001, 24(3) :43-52.
  • 5Chen H, Denning D, Roberts N, et al. The Dark Web Forum Portal: from Multi-lingual to Video [ C ]. Intelligence and Secur- ity Informatics, International Conference on IEEE, 2011:7-14.
  • 6Correa C D, Ma K L. Visualizing Social Networks[ M]. Social Network Data Analytics. , Springer US, 2011 : 307-326.
  • 7Mika P. Flink: Semantic Web Technology for the Extraction and Analysis of Social Networks. Web Semantics: Science [ J ]. Services and Agents on the World Wide Web, 2005, 3(2) : 211 -223.
  • 8Kolda T, Brown D, Corones J, et al. Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery[ R]. DHS Workshop on Data Sciences. 2004.
  • 9Yang C C, Ng T D. Terrorism and Crime Related Weblog social Network: Link, Content Analysis and Information Visualization [ C]. Intelligence and Security Informatics, 2007 IEEE. ISI:55 -58.
  • 10Sageman M. Understanding Terror Networks[ M]. University of Pennsylvania Press, 2004.

共引文献93

同被引文献257

引证文献19

二级引证文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部