Automatic construction of domain theory for attack planning

Xiaochen Li, Wenji Mao, Daniel Zeng, Fei Yue Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Abstract

Terrorism organizations are devising increasingly sophisticated plans to conduct attacks. The ability of emulating or constructing attack plans by potential terrorists can help us understand the intents and motivation behind terrorism activities. A feasible computational method to construct plans is planning technique in AI. Traditionally, AI planning methods rely on a predefined domain theory which is compiled by domain experts manually. To facilitate domain theory construction and plan generation, we propose a method to construct domain theory automatically from free text data. The effectiveness of our proposed approach is evaluated empirically through experimental studies using real world terrorist plans .

Original languageEnglish (US)
Title of host publicationISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationPublic Safety and Security
Pages65-70
Number of pages6
DOIs
StatePublished - Jul 26 2010
Event2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, ISI 2010 - Vancouver, BC, Canada
Duration: May 23 2010May 26 2010

Publication series

NameISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security

Other

Other2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, ISI 2010
CountryCanada
CityVancouver, BC
Period5/23/105/26/10

    Fingerprint

Keywords

  • Domain theory
  • Knowledge extraction
  • Planning
  • Terrorism informatics

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Safety, Risk, Reliability and Quality

Cite this

Li, X., Mao, W., Zeng, D., & Wang, F. Y. (2010). Automatic construction of domain theory for attack planning. In ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security (pp. 65-70). [5484775] (ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security). https://doi.org/10.1109/ISI.2010.5484775