Information Fusion and Data Mining for Homeland Security

The titles below are representative of several areas of information assurance to which UConn faculty have contributed. The ASAM (Adaptive Safety and Monitoring) project was jointly developed by Dr. Pattipati, Dr. Willett, and Aptima. This was a sophisticated and seamless software product that attempted to find terrorist patterns within transactional (financial, communication, etc.) data. The key was from target tracking: false alarms and missed detections were incorporated according to a hidden Markov Model (HMM) structure, this being predefined by subject matter experts (SMEs). It was tested in several scenarios: San Diego Airport attack vulnerability exercise, Greek Olympics simulation, etc. Other research developed techniques to detect via a sensor network, a strategy whereby no eavesdropper can discern anything at all. Other research – a collaborative effort with NATO’s Undersea Research Center (NURC) – includes port protection and maritime situational awareness. UConn faculty and students have published over 30 peer-reviewed papers in the area of information analysis and data mining for homeland security. Key Faculty Krishna Pattipati (ECE) Peter Willett (ECE) Publications

  • Book Chapters
    • G. Levchuk, C. Meirina, S. Singh, K.R. Pattipati, P.K. Willett and K. Chopra “Learning from the Enemy: Approaches to Identifying and Modeling the Hidden Enemy Organization”, in A. Kott (ed), Information Warfare and Organizational Decision-making, Artech House, Norwood, MA, 2007.
    • Y. Levchuk, G. Levchuk, C. Meirina, S. Ruan, K.R. Pattipati and D.L. Kleinman, “Organizational Armor: Design of Attack-resistant Organizations,” in A. Kott (ed.) Information Warfare and Organizational Performance, Artech House, Norwood, MA, 2007.
    • K.R. Pattipati, P.K. Willett, J. Allanach, H. Tu and S. Singh, “Hidden Markov Models and Bayesian Networks for Counter-terrorism,” in R. Popp and J. Yen (eds.) Emergent Information Technologies and Enabling Policies for Counter Terrorism, Wiley-IEEE Press, May 2006, pp. 27-50.
    • J.B. Sharkey, D. Weishar, J. Lockwood, R. Loui, R. Rohwer, J. Byrnes, K.R. Pattipati, S. Eick, and D. Cousins, “Signal Processing and Information Management Technologies for Counter-Terrorism,” in R. Popp and J. Yen (eds.) Emergent Information Technologies and Enabling Policies for Counter Terrorism, Wiley-IEEE Press, May 2006, pp. 75-104.
    • R.A. Ammar, S.A. Demurjian, I.R. Greenshields, K.R. Pattipati, S. Rajasekaran, “Analysis of Heterogeneous Data in Ultrahigh Dimensions,” in R. Popp and J. Yen (eds.) Emergent Information Technologies and Enabling Policies for Counter Terrorism, Wiley-IEEE Press, May 2006, pp. 105-124.
  • Peer-Reviewed Journals
    • S. Marano, V. Matta, and P. Willett, “Distributed Detection with Censoring Sensors under Physical Layer Secrecy,” IEEE Transactions on Signal Processing, vol. 57, no. 5, pp. 1976-1986, May 2009.
    • S. Singh, H. Tu, W. Donat, K. Pattipati, and P. Willett, “Anomaly Detection via Feature- Aided Tracking and Hidden Markov Models,” IEEE Transactions on Systems, Man & Cybernetics, Part A: Systems and Humans, vol. 39, no. 1, pp. 144-159, January 2009.
    • H. Tu, J. Allanach, S. Singh, K. Pattipati, and P. Willett, “Information Integration via Hierarchical and Hybrid Bayesian Networks,” IEEE Transactions on Systems, Man & Cybernetics, Part A: Systems and Humans, vol. 36, no. 1, pp. 19-33, January, 2006.
    • C. Meirina, G.M. Levchuk, S. Ruan, K.R. Pattipati, and R. Popp, “Normative Framework and Computational Models for Simulating and Assessing Command and Control Processes,” Special Issue on Computer Modeling of Organizational Processes: Journal of Simulation Modeling Practice and Theory, 14, 2006, pp.454-479. http://www.emeraldinsight.com/Insight/viewContentItem.do?contentId=1583182
    • S. Singh, J. Allanach, H. Tu, K. Pattipati, and P. Willett, “Modeling Threats,” IEEE Potentials, August/September 2004, pp. 18-21.
    • A. Pete, K.R. Pattipati, Y. Levchuk, and D.L. Kleinman, “An Overview of Decision Networks,” IEEE Transactions on Systems, Man, and Cybernetics: Part C – Applications, Vol. 28, May 1998, pp.172-192. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?tp=&arnumber=669546
    • A. Pete, K.R. Pattipati, and D.L. Kleinman, “Optimization of Detection Networks with Multiple Event Structures,” IEEE Transactions on Automatic Control, Aug. 1994, pp. 1702-1707. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=310056
  • Peer-Reviewed Conference Papers
    • G. Levchuk, B. Skarin, and K. Pattipati, “Identifying Critical Resources and Operations of the Adversaries from Incomplete Data”, 14th International Command and Control Research and Technology Symposium, Washing D.C., June 2009
    • G. Levchuk, S. Galster, and K. Pattipati, “Developing Automated Intelligence Collection Plans from Probabilistic Behavior Estimates”, 14th International Command and Control Research and Technology Symposium, Washing D.C., June 2009
    • L.A. Kuznar, V. Asal, K. Rethemeyer, K.R. Pattipati, R. Popp, and S. Shellman, “Fingerprinting Leading Indicators of WMD Terrorism: An Integrated Modeling Approach,” AAAI Spring 09- Symposium on Techno-social Predictive Analytics, Stanford, CA, March 23-25, 2009. http://www.aaai.org/Library/Symposia/Spring/2009/ss09-09-014.php
    • A. Kiayias, J. Neumann, D. Walluck, and O. McCusker, “A Combined Fusion and Data Mining Framework for the Detection of Botnets,” Proceedings of Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009. IEEE Press. Pp. 273-284. http://www2.computer.org/portal/web/csdl/doi/10.1109/CATCH.2009.9
    • V. Asal, K. Choi, K.R. Pattipati, “Forecasting the Use of Violence in Ethnic‐political Organizations: Middle Eastern Minorities, At Risk Minorities and the Choice of Violence,” ISA Annual Convention, New York, NY, February 15-18, 2009.
    • K. Choi, V. Asal, and K.R. Pattipati, “A Data-driven Classification Framework for Conflict and Instability Analysis,” IEEE SMC Conference, Singapore, Oct. 2008. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4811260
    • F. Yu, G. Levchuk, K. Pattipati, and F. Tu, “A Probabilistic Computational Model for Identifying Organizational Structures from Uncertain Message Data”, Fusion 2007, Quebec City, Quebec, Canada, July 2007
    • G. Levchuk, F. Yu, H. Tu, K. Pattipati, Y. Levchuk, and E. Entin, “Identifying the Enemy – Part I: Automated Network Identification Model”, 12th International Command and Control Research and Technology Symposium, Newport, RI, June 2007. http://www.dodccrp.org/events/12th_ICCRTS/CD/html/papers/083.pdf
    • S. Singh, W. Donat, H. Tu, K.R. Pattipati, and P. Willett, “Anomaly Detection via Feature-Aided Tracking and Hidden Markov Models,” IEEE Aerospace Conference, Big Sky, Montana, March 2007.
    • S. Singh, W. Donat, H. Tu, J. Lu, K.R. Pattipati, and P. Willett, “An Advanced System for Modeling Asymmetric Threats,” in Proc. IEEE International Conference on SMC, Taipei, Taiwan, 2006.
    • R. Popp, K.R. Pattipati, P.K. Willett, D. Serfaty, W. Stacy, K. Carley, J. Allanach, H. Tu and S. Singh, “Collaborative Tools for Counter-terrorism Analysis,” 2005 IEEE Aerospace Conference, Big Sky, Montana, March 2005.
    • R. Popp, K.R. Pattipati, P. Willett, D. Serfaty, W. Stacy, K. Carley, J. Allanach, H. Tu and S. Singh, “Collaboration and Modeling Tools for Counter-Terrorism Analysis,” CIHSPS2004 – IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, Venice, Italy, July 2004. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1360206
    • J. Allanach, H. Tu, F. Tu, S. Singh, P. Willett, and K.R. Pattipati, “Detecting, Tracking, and Counteracting Terrorist Networks via Hidden Markov Models,” Proceedings of the IEEE Aerospace Conference, March 2004.
  • Dissertations
    • Satnam Singh, “Hidden Markov models for anomaly detection and fault diagnosis,” (Advisor: K. sPattipati), 2007. PDF

Software Artifacts

  • Adaptive Safety Analysis and Monitoring (ASAM) software tool