Text analysis and entity extraction in asymmetric threat response and prediction

Erwin Chan, Jason Ginsburg, Brian Ten Eyck, Jerzy Rozenblit, Mike Dameron

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

The Asymmetric Threat Response and Analysis Program (ATRAP) is a software system for intelligence fusion, visualization, reasoning, and prediction. ATRAP consists of a set of tools for annotating and automatically extracting entities and relationships from documents, visualizing this information in relational, geographic, and temporal dimensions, and determining future courses of action of adversaries by creating situational threat templates and applying customized prediction algorithms. In this paper, we first describe the task of analyzing data in intelligence reports, and then provide an overview of major system components: the Text Highlighter tool, the Thought Spacetm visualization environment, and the Template Builder and prediction tool. Subsequently, we describe linguistic characteristics of intelligence reports, and describe ATRAP's named entity recognition system.

Original languageEnglish (US)
Title of host publicationISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics
Subtitle of host publicationPublic Safety and Security
Pages202-207
Number of pages6
DOIs
StatePublished - 2010
Event2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, ISI 2010 - Vancouver, BC, Canada
Duration: May 23 2010May 26 2010

Publication series

NameISI 2010 - 2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security

Other

Other2010 IEEE International Conference on Intelligence and Security Informatics: Public Safety and Security, ISI 2010
Country/TerritoryCanada
CityVancouver, BC
Period5/23/105/26/10

Keywords

  • Entity extraction
  • Intelligence analysis

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Text analysis and entity extraction in asymmetric threat response and prediction'. Together they form a unique fingerprint.

Cite this