Preface |
|
xv | |
|
|
xix | |
|
|
1 | (20) |
|
What is `Knowledge Discovery'? |
|
|
2 | (4) |
|
Main Forms of Knowledge Discovery |
|
|
2 | (2) |
|
|
4 | (2) |
|
What is an Adversarial Setting? |
|
|
6 | (5) |
|
Algorithmic Knowledge Discovery |
|
|
11 | (5) |
|
What is Different about Adversarial Knowledge Discovery? |
|
|
14 | (2) |
|
|
16 | (5) |
|
|
21 | (20) |
|
|
21 | (5) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Slow Changes in the Underlying Situation |
|
|
26 | (1) |
|
Change is the Important Property |
|
|
26 | (1) |
|
|
27 | (1) |
|
Fusion of Different Kinds of Data |
|
|
27 | (3) |
|
|
30 | (3) |
|
|
30 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Reasons for Data Collection |
|
|
32 | (1) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
35 | (6) |
|
|
37 | (1) |
|
|
38 | (3) |
|
|
41 | (26) |
|
|
41 | (7) |
|
Subverting Knowledge Discovery |
|
|
48 | (5) |
|
Subverting the Data-Collection Phase |
|
|
48 | (1) |
|
Subverting the Analysis Phase |
|
|
49 | (1) |
|
Subverting the Decisiori-and-Action Phase |
|
|
50 | (1) |
|
The Difficulty of Fabricating Data |
|
|
50 | (3) |
|
Effects of Technology Properties |
|
|
53 | (3) |
|
Sensemaking and Situational Awareness |
|
|
56 | (4) |
|
|
58 | (2) |
|
Taking Account of the Adversarial Setting over Time |
|
|
60 | (1) |
|
Does This Book Help Adversaries? |
|
|
61 | (1) |
|
|
62 | (5) |
|
Looking for Risk --- Prediction and Anomaly Detection |
|
|
67 | (60) |
|
|
67 | (8) |
|
|
67 | (1) |
|
The Problem of Human Variability |
|
|
68 | (1) |
|
The Problem of Computational Difficulty |
|
|
68 | (1) |
|
|
68 | (2) |
|
The Problem of Justifiable Preemption |
|
|
70 | (1) |
|
The Problem of Hindsight Bias |
|
|
71 | (1) |
|
|
72 | (3) |
|
Outline of Prediction Technology |
|
|
75 | (7) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
80 | (2) |
|
Prediction with an Associated Confidence |
|
|
82 | (1) |
|
Concealment Opportunities |
|
|
82 | (2) |
|
|
84 | (24) |
|
|
84 | (4) |
|
|
88 | (5) |
|
|
93 | (2) |
|
|
95 | (6) |
|
|
101 | (2) |
|
|
103 | (2) |
|
|
105 | (2) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (5) |
|
|
113 | (1) |
|
Special Case: Looking for Matches |
|
|
114 | (1) |
|
Special Case: Looking for Outliers |
|
|
115 | (4) |
|
Special Case: Frequency Ranking |
|
|
119 | (4) |
|
|
120 | (1) |
|
|
121 | (1) |
|
Records Similar to Those Seen Before |
|
|
122 | (1) |
|
Records with Some Other Frequency |
|
|
123 | (1) |
|
Special Case: Discrepancy Detection |
|
|
123 | (4) |
|
Looking for Similarity - Clustering |
|
|
127 | (30) |
|
|
128 | (2) |
|
Outline of Clustering Technology |
|
|
130 | (4) |
|
Concealment Opportunities |
|
|
134 | (1) |
|
|
135 | (16) |
|
Distance-Based Clustering |
|
|
136 | (2) |
|
|
138 | (1) |
|
Distribution-Based Clustering |
|
|
139 | (2) |
|
Decomposition-Based Clustering |
|
|
141 | (3) |
|
|
144 | (2) |
|
|
146 | (4) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
Special Case - Looking for Outliers Revisited |
|
|
152 | (5) |
|
Looking Inside Groups --- Relationship Discovery |
|
|
157 | (44) |
|
|
158 | (1) |
|
Outline of Relationship-Discovery Technology |
|
|
159 | (8) |
|
|
162 | (3) |
|
|
165 | (1) |
|
|
166 | (1) |
|
Concealment Opportunities |
|
|
167 | (3) |
|
|
170 | (24) |
|
|
170 | (2) |
|
|
172 | (4) |
|
Pattern Matching/Information Retrieval |
|
|
176 | (3) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
183 | (2) |
|
|
185 | (4) |
|
|
189 | (1) |
|
Anomalous-Substructure Discovery |
|
|
189 | (5) |
|
|
194 | (1) |
|
|
194 | (7) |
|
Discovery from Public Textual Data |
|
|
201 | (46) |
|
Text as it Reveals Internal State |
|
|
203 | (1) |
|
|
204 | (5) |
|
Finding Texts of Interest |
|
|
205 | (1) |
|
|
206 | (2) |
|
|
208 | (1) |
|
Finding Author Properties |
|
|
208 | (1) |
|
|
208 | (1) |
|
Outline of Textual-Analysis Technology |
|
|
209 | (5) |
|
|
210 | (3) |
|
|
213 | (1) |
|
Exploring Metainformation |
|
|
213 | (1) |
|
Concealment Opportunities |
|
|
214 | (2) |
|
|
216 | (22) |
|
|
216 | (2) |
|
Extracting Interesting Documents from a Large Set |
|
|
218 | (2) |
|
Extracting Named Entities |
|
|
220 | (1) |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
224 | (2) |
|
Extracting Narrative and Sensemaking |
|
|
226 | (1) |
|
|
227 | (2) |
|
Extracting Intention and Slant |
|
|
229 | (1) |
|
|
229 | (1) |
|
Authorship from Large Samples |
|
|
230 | (1) |
|
Authorship from Small Samples |
|
|
231 | (4) |
|
Detecting Author Properties |
|
|
235 | (2) |
|
Extracting Metainformation |
|
|
237 | (1) |
|
|
238 | (9) |
|
|
238 | (2) |
|
|
240 | (1) |
|
Fusing Data from Different Contexts |
|
|
241 | (6) |
|
Discovery in Private Communication |
|
|
247 | (26) |
|
The Impact of Obfuscation |
|
|
249 | (1) |
|
|
249 | (1) |
|
Concealment Opportunities |
|
|
249 | (4) |
|
|
250 | (1) |
|
|
251 | (2) |
|
|
253 | (16) |
|
Selection of Interesting Communication |
|
|
253 | (9) |
|
Content Extraction after Substitution |
|
|
262 | (6) |
|
Authorship after Substitution |
|
|
268 | (1) |
|
Metainformation after Substitution |
|
|
268 | (1) |
|
|
269 | (4) |
|
Using a Multifaceted Process for Selection |
|
|
269 | (4) |
|
Discovering Mental and Emotional State |
|
|
273 | (28) |
|
Frame Analysis for Intentions |
|
|
274 | (4) |
|
|
275 | (1) |
|
Frame-Analysis Detection Technology |
|
|
276 | (1) |
|
Concealment Opportunities |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (3) |
|
|
278 | (1) |
|
Sentiment-Analysis Technology |
|
|
279 | (2) |
|
Concealment Opportunities |
|
|
281 | (1) |
|
|
281 | (11) |
|
|
282 | (1) |
|
Mental-State Extraction Technology |
|
|
283 | (8) |
|
Concealment Opportunities |
|
|
291 | (1) |
|
Systemic Functional Linguistics |
|
|
292 | (9) |
|
Introduction to Systemic Functional Linguistics |
|
|
293 | (3) |
|
SFL for Intention Detection |
|
|
296 | (1) |
|
SFL for Sentiment Analysis |
|
|
296 | (1) |
|
SFL for Mental-State Extraction |
|
|
297 | (4) |
|
|
301 | (16) |
|
|
301 | (4) |
|
|
305 | (2) |
|
|
307 | (4) |
|
|
311 | (6) |
|
|
311 | (1) |
|
Straightforward Technical Problems |
|
|
312 | (2) |
|
More-Difficult Technical Advances |
|
|
314 | (3) |
Bibliography |
|
317 | (10) |
Index |
|
327 | |