Automatic construction of domain theory for attack planning

Xiaochen Li, Wenji Mao, Dajun Zeng, Fei Yue Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Terrorism organizations are devising increasingly sophisticated plans to conduct attacks. The ability of emulating or constructing attack plans by potential terrorists can help us understand the intents and motivation behind terrorism activities. A feasible computational method to construct plans is planning technique in AI. Traditionally, AI planning methods rely on a predefined domain theory which is compiled by domain experts manually. To facilitate domain theory construction and plan generation, we propose a method to construct domain theory automatically from free text data. The effectiveness of our proposed approach is evaluated empirically through experimental studies using real world terrorist plans .

Original languageEnglish (US)
Title of host publicationISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security
Pages65-70
Number of pages6
DOIs
StatePublished - 2010
Event2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, ISI 2010 - Vancouver, BC, Canada
Duration: May 23 2010May 26 2010

Other

Other2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, ISI 2010
CountryCanada
CityVancouver, BC
Period5/23/105/26/10

Fingerprint

Terrorism
Planning
Computational methods

Keywords

  • Domain theory
  • Knowledge extraction
  • Planning
  • Terrorism informatics

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Safety, Risk, Reliability and Quality

Cite this

Li, X., Mao, W., Zeng, D., & Wang, F. Y. (2010). Automatic construction of domain theory for attack planning. In ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security (pp. 65-70). [5484775] https://doi.org/10.1109/ISI.2010.5484775

Automatic construction of domain theory for attack planning. / Li, Xiaochen; Mao, Wenji; Zeng, Dajun; Wang, Fei Yue.

ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. 2010. p. 65-70 5484775.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Li, X, Mao, W, Zeng, D & Wang, FY 2010, Automatic construction of domain theory for attack planning. in ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security., 5484775, pp. 65-70, 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, ISI 2010, Vancouver, BC, Canada, 5/23/10. https://doi.org/10.1109/ISI.2010.5484775
Li X, Mao W, Zeng D, Wang FY. Automatic construction of domain theory for attack planning. In ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. 2010. p. 65-70. 5484775 https://doi.org/10.1109/ISI.2010.5484775
Li, Xiaochen ; Mao, Wenji ; Zeng, Dajun ; Wang, Fei Yue. / Automatic construction of domain theory for attack planning. ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security. 2010. pp. 65-70
@inproceedings{75874420a5ff4d5695efd0fa97646ee6,
title = "Automatic construction of domain theory for attack planning",
abstract = "Terrorism organizations are devising increasingly sophisticated plans to conduct attacks. The ability of emulating or constructing attack plans by potential terrorists can help us understand the intents and motivation behind terrorism activities. A feasible computational method to construct plans is planning technique in AI. Traditionally, AI planning methods rely on a predefined domain theory which is compiled by domain experts manually. To facilitate domain theory construction and plan generation, we propose a method to construct domain theory automatically from free text data. The effectiveness of our proposed approach is evaluated empirically through experimental studies using real world terrorist plans .",
keywords = "Domain theory, Knowledge extraction, Planning, Terrorism informatics",
author = "Xiaochen Li and Wenji Mao and Dajun Zeng and Wang, {Fei Yue}",
year = "2010",
doi = "10.1109/ISI.2010.5484775",
language = "English (US)",
isbn = "9781424464609",
pages = "65--70",
booktitle = "ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security",

}

TY - GEN

T1 - Automatic construction of domain theory for attack planning

AU - Li, Xiaochen

AU - Mao, Wenji

AU - Zeng, Dajun

AU - Wang, Fei Yue

PY - 2010

Y1 - 2010

N2 - Terrorism organizations are devising increasingly sophisticated plans to conduct attacks. The ability of emulating or constructing attack plans by potential terrorists can help us understand the intents and motivation behind terrorism activities. A feasible computational method to construct plans is planning technique in AI. Traditionally, AI planning methods rely on a predefined domain theory which is compiled by domain experts manually. To facilitate domain theory construction and plan generation, we propose a method to construct domain theory automatically from free text data. The effectiveness of our proposed approach is evaluated empirically through experimental studies using real world terrorist plans .

AB - Terrorism organizations are devising increasingly sophisticated plans to conduct attacks. The ability of emulating or constructing attack plans by potential terrorists can help us understand the intents and motivation behind terrorism activities. A feasible computational method to construct plans is planning technique in AI. Traditionally, AI planning methods rely on a predefined domain theory which is compiled by domain experts manually. To facilitate domain theory construction and plan generation, we propose a method to construct domain theory automatically from free text data. The effectiveness of our proposed approach is evaluated empirically through experimental studies using real world terrorist plans .

KW - Domain theory

KW - Knowledge extraction

KW - Planning

KW - Terrorism informatics

UR - http://www.scopus.com/inward/record.url?scp=77954795701&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77954795701&partnerID=8YFLogxK

U2 - 10.1109/ISI.2010.5484775

DO - 10.1109/ISI.2010.5484775

M3 - Conference contribution

SN - 9781424464609

SP - 65

EP - 70

BT - ISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security

ER -