Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. / Edition 1

Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. / Edition 1

by Sharad Mehrotra
     
 

This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, held in San Diego, CA, USA, in May 2006. The 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in

See more details below

Overview

This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006, held in San Diego, CA, USA, in May 2006. The 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; emerging applications; data analysis, knowledge discovery, and information dissemination; access control, privacy, and cyber trust; surveillance, bioterrorism, and emergency response; infrastructure protection and cyber security; data analysis and knowledge discovery; data, information, and knowledge management; threat detection, surveillance, and emergency response; as well as infrastructure protection and cyber security.

Read More

Product Details

ISBN-13:
9783540344780
Publisher:
Springer Berlin Heidelberg
Publication date:
07/06/2006
Series:
Lecture Notes in Computer Science / Information Systems and Applications, incl. Internet/Web, and HCI Series, #3975
Edition description:
2006
Pages:
778
Product dimensions:
1.56(w) x 6.14(h) x 9.21(d)

Table of Contents

Long Papers.- Computer-Mediated Collaborative Reasoning and Intelligence Analysis.- Using Importance Flooding to Identify Interesting Networks of Criminal Activity.- Towards Automatic Event Tracking.- Interactive Refinement of Filtering Queries on Streaming Intelligence Data.- Semantic Analytics Visualization.- Visualizing Authorship for Identification.- A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases.- Iterative Relational Classification Through Three–State Epidemic Dynamics.- Analyzing Entities and Topics in News Articles Using Statistical Topic Models.- The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment.- Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders.- Design and Implementation of a Policy-Based Privacy Authorization System.- Privacy Preserving DBSCAN for Vertically Partitioned Data.- Inferring Privacy Information from Social Networks.- Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects.- Adaptive Method for Monitoring Network and Early Detection of Internet Worms.- Measures to Detect Word Substitution in Intercepted Communication.- Finding Hidden Group Structure in a Stream of Communications.- Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.- Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks.- DrillSim: A Simulation Framework for Emergency Response Drills.- A Review of Public Health Syndromic Surveillance Systems.- A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks.- Integrating IDS Alert Correlation and OS-Level Dependency Tracking.- Attacking Confidentiality: An Agent Based Approach.- Viability of Critical Mission of Grid Computing.- Suspect Vehicle Identification for Border Safety with Modified Mutual Information.- Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures.- Analyzing the Terrorist Social Networks with Visualization Tools.- Tracing the Event Evolution of Terror Attacks from On-Line News.- Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models.- On the Topology of the Dark Web of Terrorist Groups.- Indicators of Threat: Reflecting New Trends.- Practical Algorithms for Destabilizing Terrorist Networks.- Combating Terrorism Insurgency Resolution Software: A Research Note.- A First Look at Domestic and International Global Terrorism Events, 1970–1997.- Computational Modeling and Experimental Validation of Aviation Security Procedures.- Intelligent Face Recognition Using Feature Averaging.- Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness.- Short Papers.- Database Security Protection Via Inference Detection.- An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.- Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading.- Strategic Intelligence Analysis: From Information Processing to Meaning-Making.- A Multi-layer Naïve Bayes Model for Approximate Identity Matching.- Towards Optimal Police Patrol Routes with Genetic Algorithms.- SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment.- A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.- Detecting Deception in Person-of-Interest Statements.- Personal Information Management (PIM) for Intelligence Analysis.- Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.- Sanitization of Databases for Refined Privacy Trade-Offs.- Access Control Requirements for Preventing Insider Threats.- Venn Diagram Construction of Internet Chatroom Conversations.- Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.- Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons.- An Info-Gap Approach to Policy Selection for Bio-terror Response.- Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities.- Covering Based Granular Computing for Conflict Analysis.- Hybrid Modeling for Large-Scale Worm Propagation Simulations.- Worm Traffic Modeling for Network Performance Analysis.- Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors.- A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach.- Distributing the Cost of Securing a Transportation Infrastructure.- Multi-document Summarization for Terrorism Information Extraction.- Rational Choice Deterrence and Israeli Counter-Terrorism.- Content Analysis of Jihadi Extremist Groups’ Videos.- Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums.- Fast Pedestrian Detection Using Color Information.- SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home.- Extended Abstracts for Posters and Demos.- Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts.- Using Author Topic to Detect Insider Threats from Email Traffic.- Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.- On Off-Topic Web Browsing.- Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints.- Intelligence Analysis Using High Resolution Displays.- Privacy Preserving Mining of Global Association Rules on Distributed Dataset.- CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications.- KD3 Scheme for Privacy Preserving Data Mining.- Using Logic Programming to Detect Deception on the Basis of Actions.- Intelligent Information Retrieval Tools for Police.- Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction.- A Child’s Story to Illustrate Automated Reasoning Systems Using Opportunity and History.- Detection Using Clustering Query Results.- Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks.- Mining the Acceleration-Like Association Rules.- Analyzing Social Networks in E-Mail with Rich Syntactic Features.- E-mail Traffic Analysis Using Visualisation and Decision Trees.- Advanced Patterns and Matches in Link Analysis.- A Flexible Context-Aware Authorization Framework for Mediation Systems.- Continuous Authentication by Keystroke Dynamics Using Committee Machines.- A Flexible and Scalable Access Control for Ubiquitous Computing Environments.- A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society.- Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection.- Intelligence Use of Unstructured Data in a Data Warehouse Environment.- An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems.- Classification of Threats Via a Multi-sensor Security Portal.- Exploring the Detection Process: Integrating Judgment and Outcome Decomposition.- Issues in Merging Internet Autonomous Systems for Emergency Communications.- CWME: A Framework of Group Support System for Emergency Responses.- Abnormal Detection Algorithm Based on Match Range Model.- Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks.- A PCA-LVQ Model for Intrusion Alert Analysis.- A Formalized Taxonomy of DDoS Attacks Based on Similarity.- Practical Intrusion Detection Using Genetic-Clustering.- An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach.- Design and Implementation of FPGA Based High-Performance Intrusion Detection System.- Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis.- Detecting Anomalies in Cargo Using Graph Properties.- Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.- Email Worm Detection Using Naïve Bayes and Support Vector Machine.- An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.- A New Methodology of Analyzing Security Vulnerability for Network Services.- Using One-Time Password Based Authentication for Wireless IP Network.- Experimental Study on Wireless Sensor Network Security.- Terrorist Database: A Bangladesh Study.- Terrorist Organizations and Effects of Terrorism in Bangladesh.- Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight.- The Role of Information Superiority in the Global War on Terrorism.- A Trust-Based Security Architecture for Ubiquitous Computing Systems.- A Trust Model for Uncertain Interactions in Ubiquitous Environments.- A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles.- A Home Firewall Solution for Securing Smart Spaces.- The Security Performance Evaluation of Digital Watermarking.- A Novel Key Release Scheme from Biometrics.- Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >