AI Applied to Intelligence and Security: Technologies and EC-Funded Initiatives Article Swipe
Domenico Frascà
,
Alessandro Zanasi
,
Maria Ustenko
,
Paola Fratantoni
,
Giulia Venturi⋄
·
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1007/978-3-031-62083-6_39
YOU?
·
· 2024
· Open Access
·
· DOI: https://doi.org/10.1007/978-3-031-62083-6_39
This chapter reports on the artificial intelligence (AI) technologies and EC-funded initiatives and research projects focused on the application of AI to the security and intelligence fields. Nowadays, the AI technology is transversal to a multitude of activities in all phases of the intelligence cycle. In particular, the use of AI in the phases of collection, processing, and analysis of data and information is now part of the state of the art. Several software tools, frameworks, and techniques are available, and security and intelligence practitioners that make use of AI technologies often adapt and customize these frameworks for the context and purpose of the specific operational case.
Related Topics
Concepts
Metadata
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.1007/978-3-031-62083-6_39
- OA Status
- hybrid
- References
- 3
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4402960571
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4402960571Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/978-3-031-62083-6_39Digital Object Identifier
- Title
-
AI Applied to Intelligence and Security: Technologies and EC-Funded InitiativesWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2024Year of publication
- Publication date
-
2024-09-29Full publication date if available
- Authors
-
Domenico Frascà, Alessandro Zanasi, Maria Ustenko, Paola Fratantoni, Giulia Venturi⋄List of authors in order
- Landing page
-
https://doi.org/10.1007/978-3-031-62083-6_39Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1007/978-3-031-62083-6_39Direct OA link when available
- Concepts
-
Engineering management, Political science, Business, Engineering ethics, Computer science, Knowledge management, EngineeringTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
3Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4402960571 |
|---|---|
| doi | https://doi.org/10.1007/978-3-031-62083-6_39 |
| ids.doi | https://doi.org/10.1007/978-3-031-62083-6_39 |
| ids.openalex | https://openalex.org/W4402960571 |
| fwci | 0.0 |
| type | book-chapter |
| title | AI Applied to Intelligence and Security: Technologies and EC-Funded Initiatives |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 495 |
| biblio.first_page | 485 |
| topics[0].id | https://openalex.org/T12921 |
| topics[0].field.id | https://openalex.org/fields/33 |
| topics[0].field.display_name | Social Sciences |
| topics[0].score | 0.3734999895095825 |
| topics[0].domain.id | https://openalex.org/domains/2 |
| topics[0].domain.display_name | Social Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/3320 |
| topics[0].subfield.display_name | Political Science and International Relations |
| topics[0].display_name | European Criminal Justice and Data Protection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C110354214 |
| concepts[0].level | 1 |
| concepts[0].score | 0.38393720984458923 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q6314146 |
| concepts[0].display_name | Engineering management |
| concepts[1].id | https://openalex.org/C17744445 |
| concepts[1].level | 0 |
| concepts[1].score | 0.3779654800891876 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q36442 |
| concepts[1].display_name | Political science |
| concepts[2].id | https://openalex.org/C144133560 |
| concepts[2].level | 0 |
| concepts[2].score | 0.3688702881336212 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[2].display_name | Business |
| concepts[3].id | https://openalex.org/C55587333 |
| concepts[3].level | 1 |
| concepts[3].score | 0.352211594581604 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1133029 |
| concepts[3].display_name | Engineering ethics |
| concepts[4].id | https://openalex.org/C41008148 |
| concepts[4].level | 0 |
| concepts[4].score | 0.349265456199646 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[4].display_name | Computer science |
| concepts[5].id | https://openalex.org/C56739046 |
| concepts[5].level | 1 |
| concepts[5].score | 0.331315815448761 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q192060 |
| concepts[5].display_name | Knowledge management |
| concepts[6].id | https://openalex.org/C127413603 |
| concepts[6].level | 0 |
| concepts[6].score | 0.3299793004989624 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[6].display_name | Engineering |
| keywords[0].id | https://openalex.org/keywords/engineering-management |
| keywords[0].score | 0.38393720984458923 |
| keywords[0].display_name | Engineering management |
| keywords[1].id | https://openalex.org/keywords/political-science |
| keywords[1].score | 0.3779654800891876 |
| keywords[1].display_name | Political science |
| keywords[2].id | https://openalex.org/keywords/business |
| keywords[2].score | 0.3688702881336212 |
| keywords[2].display_name | Business |
| keywords[3].id | https://openalex.org/keywords/engineering-ethics |
| keywords[3].score | 0.352211594581604 |
| keywords[3].display_name | Engineering ethics |
| keywords[4].id | https://openalex.org/keywords/computer-science |
| keywords[4].score | 0.349265456199646 |
| keywords[4].display_name | Computer science |
| keywords[5].id | https://openalex.org/keywords/knowledge-management |
| keywords[5].score | 0.331315815448761 |
| keywords[5].display_name | Knowledge management |
| keywords[6].id | https://openalex.org/keywords/engineering |
| keywords[6].score | 0.3299793004989624 |
| keywords[6].display_name | Engineering |
| language | en |
| locations[0].id | doi:10.1007/978-3-031-62083-6_39 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210172439 |
| locations[0].source.issn | 2523-8507, 2523-8515 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2523-8507 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Security informatics and law enforcement |
| locations[0].source.host_organization | https://openalex.org/P4310319972 |
| locations[0].source.host_organization_name | Springer International Publishing |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319972 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Security Informatics and Law Enforcement |
| locations[0].landing_page_url | https://doi.org/10.1007/978-3-031-62083-6_39 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5114236377 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Domenico Frascà |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Domenico Frascà |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5108255549 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Alessandro Zanasi |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Alessandro Zanasi |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5041235718 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Maria Ustenko |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Maria Ustenko |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5093695126 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Paola Fratantoni |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Paola Fratantoni |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5080111149 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-5849-0979 |
| authorships[4].author.display_name | Giulia Venturi⋄ |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Giulia Venturi |
| authorships[4].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1007/978-3-031-62083-6_39 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | AI Applied to Intelligence and Security: Technologies and EC-Funded Initiatives |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12921 |
| primary_topic.field.id | https://openalex.org/fields/33 |
| primary_topic.field.display_name | Social Sciences |
| primary_topic.score | 0.3734999895095825 |
| primary_topic.domain.id | https://openalex.org/domains/2 |
| primary_topic.domain.display_name | Social Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/3320 |
| primary_topic.subfield.display_name | Political Science and International Relations |
| primary_topic.display_name | European Criminal Justice and Data Protection |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2748952813, https://openalex.org/W2765153054, https://openalex.org/W2596173151, https://openalex.org/W3213789065, https://openalex.org/W3080576469, https://openalex.org/W4231340554, https://openalex.org/W1491839574, https://openalex.org/W2391645169, https://openalex.org/W2931838652 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/978-3-031-62083-6_39 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210172439 |
| best_oa_location.source.issn | 2523-8507, 2523-8515 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2523-8507 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Security informatics and law enforcement |
| best_oa_location.source.host_organization | https://openalex.org/P4310319972 |
| best_oa_location.source.host_organization_name | Springer International Publishing |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319972 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Security Informatics and Law Enforcement |
| best_oa_location.landing_page_url | https://doi.org/10.1007/978-3-031-62083-6_39 |
| primary_location.id | doi:10.1007/978-3-031-62083-6_39 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210172439 |
| primary_location.source.issn | 2523-8507, 2523-8515 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2523-8507 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Security informatics and law enforcement |
| primary_location.source.host_organization | https://openalex.org/P4310319972 |
| primary_location.source.host_organization_name | Springer International Publishing |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319972 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Security Informatics and Law Enforcement |
| primary_location.landing_page_url | https://doi.org/10.1007/978-3-031-62083-6_39 |
| publication_date | 2024-09-29 |
| publication_year | 2024 |
| referenced_works | https://openalex.org/W4238473723, https://openalex.org/W2884941392, https://openalex.org/W3217525002 |
| referenced_works_count | 3 |
| abstract_inverted_index.a | 35 |
| abstract_inverted_index.AI | 21, 30, 51, 90 |
| abstract_inverted_index.In | 46 |
| abstract_inverted_index.in | 39, 52 |
| abstract_inverted_index.is | 32, 64 |
| abstract_inverted_index.of | 20, 37, 42, 50, 55, 60, 67, 70, 89, 103 |
| abstract_inverted_index.on | 4, 17 |
| abstract_inverted_index.to | 22, 34 |
| abstract_inverted_index.all | 40 |
| abstract_inverted_index.and | 10, 13, 25, 58, 62, 77, 81, 83, 94, 101 |
| abstract_inverted_index.are | 79 |
| abstract_inverted_index.for | 98 |
| abstract_inverted_index.now | 65 |
| abstract_inverted_index.the | 5, 18, 23, 29, 43, 48, 53, 68, 71, 99, 104 |
| abstract_inverted_index.use | 49, 88 |
| abstract_inverted_index.(AI) | 8 |
| abstract_inverted_index.This | 1 |
| abstract_inverted_index.art. | 72 |
| abstract_inverted_index.data | 61 |
| abstract_inverted_index.make | 87 |
| abstract_inverted_index.part | 66 |
| abstract_inverted_index.that | 86 |
| abstract_inverted_index.adapt | 93 |
| abstract_inverted_index.case. | 107 |
| abstract_inverted_index.often | 92 |
| abstract_inverted_index.state | 69 |
| abstract_inverted_index.these | 96 |
| abstract_inverted_index.cycle. | 45 |
| abstract_inverted_index.phases | 41, 54 |
| abstract_inverted_index.tools, | 75 |
| abstract_inverted_index.Several | 73 |
| abstract_inverted_index.chapter | 2 |
| abstract_inverted_index.context | 100 |
| abstract_inverted_index.fields. | 27 |
| abstract_inverted_index.focused | 16 |
| abstract_inverted_index.purpose | 102 |
| abstract_inverted_index.reports | 3 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.analysis | 59 |
| abstract_inverted_index.projects | 15 |
| abstract_inverted_index.research | 14 |
| abstract_inverted_index.security | 24, 82 |
| abstract_inverted_index.software | 74 |
| abstract_inverted_index.specific | 105 |
| abstract_inverted_index.EC-funded | 11 |
| abstract_inverted_index.Nowadays, | 28 |
| abstract_inverted_index.customize | 95 |
| abstract_inverted_index.multitude | 36 |
| abstract_inverted_index.activities | 38 |
| abstract_inverted_index.artificial | 6 |
| abstract_inverted_index.available, | 80 |
| abstract_inverted_index.frameworks | 97 |
| abstract_inverted_index.techniques | 78 |
| abstract_inverted_index.technology | 31 |
| abstract_inverted_index.application | 19 |
| abstract_inverted_index.collection, | 56 |
| abstract_inverted_index.frameworks, | 76 |
| abstract_inverted_index.information | 63 |
| abstract_inverted_index.initiatives | 12 |
| abstract_inverted_index.operational | 106 |
| abstract_inverted_index.particular, | 47 |
| abstract_inverted_index.processing, | 57 |
| abstract_inverted_index.transversal | 33 |
| abstract_inverted_index.intelligence | 7, 26, 44, 84 |
| abstract_inverted_index.technologies | 9, 91 |
| abstract_inverted_index.practitioners | 85 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.54868367 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |