Sagent tool suite, 72
SANS Institute, 325
SAS
fraud survey, 266
Sample, Explore, Modify, Model, Assess (SEMMA), 244
Sechole, 307
Secret Internet Protocol Router Network (SIPRNET), 212
Secured sources agents, 113
Security
data, 65–66
network systems, 322
reports (SRs), 49
Security Focus, 325
Self-organizing maps (SOMs), 10–11, 179
after merging of spatially near neighbors, 35
algorithm implementation, 30–31
applying to bogus official crimes, 25, 27
architecture, 169
CATCH, 366, 367
cells, 31
clustering border smugglers with, 169–72
as dimension-reduction visualization technique, 30
feature maps (SOFMs), 178
as innovative investigator, 178
interpretation, 31, 32
key cluster discovery with, 170–71
learning process, 169
as unsupervised neural network training method, 30
Semantic Web, 61
Semio, 151–52
automated processes, 152
concept-mapping engine, 151
defined, 151
lexical technology, 152
See also Text mining tools
September 11, 2001, 15, 24
Sexual assault offender behavior modeling case study, 348–62
abstract, 348–49
data preparation, 353–60
data understanding, 351–53
discussion, 360–61
further work, 361
introduction, 349
task understanding, 350–51
Sid2user, 306
Signatures, 21–22
calling patterns, 289–90
in data mining, 22
defined, 21
in fraud detection, 272
software, decomposing, 363–64
Simple Object Access Protocol (SOAP), 331
Socioeconomic data, 45
Software agents. See Intelligent agents
SOMine, 171
Southwest Border States Anti-Drug Information System (SWBS ADIS), 53
Spectral analysis, 189
SPSS
Answer Tree, 228
Clementine, 26, 30, 179, 180, 181, 245–47
Neural Connection, 202
STATISTICA Neural Networks, 198, 202–3
defined, 202
Input Feature Selection, 203
Intelligent Problem Solver, 203
Neuro-Genetic Input Selection component, 203
SuperQuery, 230
Survivable active networks (SANs), 323
SyncSort, 72