Professional Documents
Culture Documents
Critique Paper For Semantics-Based Threat Structure Mining For Homeland Security
Critique Paper For Semantics-Based Threat Structure Mining For Homeland Security
shipments are taken into consideration, i.e. Arizona, the chance of this situation materializing grew
higher. Such knowledge can be valuable to prevent such threats from happening. It is to acquire
such knowledge that the authors proposed the use of ESG.
The be able to use the ESG for the purpose of identifying potential threats, the overall process starts
from generating the Semantic Graph (SG). The SG is generated by identifying outliers and their
causal dimensions as nodes using collusion based distance metric. The authors choose this distance
metric because it improves both precision and recall in identifying outliers in high dimensional data
sets when compared to the Euclidean distance based outlier detection.
The next step in the process is to identify the edges that connect the nodes in the SG. This process
consists of two steps: (1) identifying the spatio-temporal relationships between the outliers and (2)
identifying the semantic weights in the relationships between the outliers. These two steps include
identifying the causal dimensions of each outlier, scoring the relationships between outlier
dimensions using a specific domain ontology, and removing (pruning) relationships that are not
supported by the ontology.
If scoring and pruning of relationships were properly executed, the ESG generated from the overall
process will have semantic properties such as semantic centrality, semantic clique, and semantic
isomorphism. Semantic centrality shows the sum of weights of all incident edges for each node.
Semantic clique shows the sum of weights in the relationships in a sub-graph with total connectivity
among the nodes. Semantic isomorphism shows the sum of weights from pairs of paths with the
same length of edges and nodes from the starting node to the end node. By analyzing these
semantic properties, the ESG can be used to show potentially dangerous relations between the
nodes. In the context of chemical shipments, the ESG can be used to show potentially dangerous
relations among individual chemical shipments.
CRITIQUE
In general, the content of the paper are consistent with the overview (abstract). The abstract
mentioned the difficulties in knowledge discovery for threat identification, the methods proposed to
handle the problems, and the limitations pertaining the experiments conducted by the authors. All
these topic are discussed in more details throughout the paper.
The paper starts by providing a brief introduction about the steps needed in the overall process of
threat identification, i.e. SG generation by outlier detection, ESG generation by spatio-temporal
relationship and semantic weight identification, and threat identification based on the ESG. Each of
these steps are explained in more details through the following sections in the paper. Not a single
step are omitted from being explained in the paper.
The explanation given for each step is quite clear. The structure of the paper made it even easier to
understand the flow of the process. The authors also provided references to new topics, e.g.
collusion distance metric, to refer readers to external publications related to the topic. This way
readers will have a better understanding on the topic being discussed. The authors also state that
they only conduct limited set of experiments with real life and simulated datasets. This is helpful to
prevent readers from assuming that their approach is directly applicable to other domains.
That being said, this paper is not without flaws. For instance, the paper failed to mention any issues
regarding the relationship detection in generating the ESG. If the ESG is used to identify potential
threats and threat patterns, then errors in detecting relationships in the ESG might result in false
identification of threats and threat patterns. Instead of being helpful in improving homeland
security, the knowledge represented in the ESG might be misleading.
Relationship detection to generate the ESG depends on domain expertise (through the use of
domain ontology) and is somewhat subjective or perhaps arbitrary. This subjectiveness introduces
biases into any algorithm that operates on semantic graphs (Barthlemy et al. 2005). This is a crucial
issue and the authors should have point out these biases in their paper or at least include any
references regarding this matter.
Another questionable aspect in this paper, albeit rather insignificant, is about triggering further
analysis against threat potentials, e.g. unusual financial transaction from originating companies. The
authors managed to mention this type of intriguing information in the introduction section, but they
fail to actually discuss this in the following sections of their paper. In my view, further explanation on
this matter might be an interesting subject as it describes follow-up actions in using the ESG for
threat identification.
CONCLUSION
Even though the authors managed to provide a good explanation of their methodology, omitting
subjectiveness and consequently biases in detecting relationship in the SG or the ESG can be
misleading. The authors should have discussed this issue in their paper so that they can provide a
better understanding of the strengths and weaknesses of their methodology. Other than that, the
content of this paper might be used as a starting point for future research in threat and vulnerability
assessment in the homeland security domain.
REFERENCES
Barthlemy, M., Chow, E., & Eliassi-Rad, T. (2005, March). Knowledge Representation Issues in
Semantic Graphs for Relationship Detection. In AAAI Spring Symposium: AI Technologies for
Homeland Security (pp. 91-98).