ABSTRACT

Security Informatics .............................................................................131 2.2.7 Current Countermeasures for Semantic Attacks.............................133 2.2.8 New Countermeasures for Semantic Attacks..................................133 2.2.9 Information Trajectory Modeling.......................................................134 2.2.10 Linguistic Countermeasures to Semantic Attacks ..........................135 2.2.11 News Verification: An Instance of Multiple

Source Semantic Attacks .....................................................................136 2.2.12 Process Query Systems for Information

Trajectory Countermeasures ...............................................................137 2.2.12.1 General Architecture of a PQS ..........................................137 2.2.12.2 Tracking and Fusion Engine (TRAFEN)..........................139 2.2.12.3 Multiple Hypothesis Tracking...........................................139

2.2.13 Tracking Hypotheses in the Financial Fraud Domain ...................141 References ............................................................................................. 142