Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, US by Sharad MehrotraIntelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, US by Sharad Mehrotra

Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security…

bySharad MehrotraEditorDaniel D. Zeng, Hsinchun Chen

Paperback | May 11, 2006

Pricing and Purchase Info


Earn 1,105 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conf- ence series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California, in May 2006. In addition to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and infor- tion technologies and tools.
Title:Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security…Format:PaperbackDimensions:778 pages, 23.5 × 15.5 × 0.01 inPublished:May 11, 2006Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540344780

ISBN - 13:9783540344780

Look for similar items by category:


Table of Contents

Long Papers.- Computer-Mediated Collaborative Reasoning and Intelligence Analysis.- Using Importance Flooding to Identify Interesting Networks of Criminal Activity.- Towards Automatic Event Tracking.- Interactive Refinement of Filtering Queries on Streaming Intelligence Data.- Semantic Analytics Visualization.- Visualizing Authorship for Identification.- A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases.- Iterative Relational Classification Through Three-State Epidemic Dynamics.- Analyzing Entities and Topics in News Articles Using Statistical Topic Models.- The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment.- Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders.- Design and Implementation of a Policy-Based Privacy Authorization System.- Privacy Preserving DBSCAN for Vertically Partitioned Data.- Inferring Privacy Information from Social Networks.- Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects.- Adaptive Method for Monitoring Network and Early Detection of Internet Worms.- Measures to Detect Word Substitution in Intercepted Communication.- Finding Hidden Group Structure in a Stream of Communications.- Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.- Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks.- DrillSim: A Simulation Framework for Emergency Response Drills.- A Review of Public Health Syndromic Surveillance Systems.- A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks.- Integrating IDS Alert Correlation and OS-Level Dependency Tracking.- Attacking Confidentiality: An Agent Based Approach.- Viability of Critical Mission of Grid Computing.- Suspect Vehicle Identification for Border Safety with Modified Mutual Information.- Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures.- Analyzing the Terrorist Social Networks with Visualization Tools.- Tracing the Event Evolution of Terror Attacks from On-Line News.- Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models.- On the Topology of the Dark Web of Terrorist Groups.- Indicators of Threat: Reflecting New Trends.- Practical Algorithms for Destabilizing Terrorist Networks.- Combating Terrorism Insurgency Resolution Software: A Research Note.- A First Look at Domestic and International Global Terrorism Events, 1970-1997.- Computational Modeling and Experimental Validation of Aviation Security Procedures.- Intelligent Face Recognition Using Feature Averaging.- Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness.- Short Papers.- Database Security Protection Via Inference Detection.- An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.- Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading.- Strategic Intelligence Analysis: From Information Processing to Meaning-Making.- A Multi-layer Naïve Bayes Model for Approximate Identity Matching.- Towards Optimal Police Patrol Routes with Genetic Algorithms.- SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment.- A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.- Detecting Deception in Person-of-Interest Statements.- Personal Information Management (PIM) for Intelligence Analysis.- Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.- Sanitization of Databases for Refined Privacy Trade-Offs.- Access Control Requirements for Preventing Insider Threats.- Venn Diagram Construction of Internet Chatroom Conversations.- Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.- Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons.- An Info-Gap Approach to Policy Selection for Bio-terror Response.- Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities.- Covering Based Granular Computing for Conflict Analysis.- Hybrid Modeling for Large-Scale Worm Propagation Simulations.- Worm Traffic Modeling for Network Performance Analysis.- Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors.- A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.- Distributing the Cost of Securing a Transportation Infrastructure.- Multi-document Summarization for Terrorism Information Extraction.- Rational Choice Deterrence and Israeli Counter-Terrorism.- Content Analysis of Jihadi Extremist Groups' Videos.- Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums.- Fast Pedestrian Detection Using Color Information.- SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home.- Extended Abstracts for Posters and Demos.- Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts.- Using Author Topic to Detect Insider Threats from Email Traffic.- Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.- On Off-Topic Web Browsing.- Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints.- Intelligence Analysis Using High Resolution Displays.- Privacy Preserving Mining of Global Association Rules on Distributed Dataset.- CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications.- KD3 Scheme for Privacy Preserving Data Mining.- Using Logic Programming to Detect Deception on the Basis of Actions.- Intelligent Information Retrieval Tools for Police.- Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction.- A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History.- Detection Using Clustering Query Results.- Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks.- Mining the Acceleration-Like Association Rules.- Analyzing Social Networks in E-Mail with Rich Syntactic Features.- E-mail Traffic Analysis Using Visualisation and Decision Trees.- Advanced Patterns and Matches in Link Analysis.- A Flexible Context-Aware Authorization Framework for Mediation Systems.- Continuous Authentication by Keystroke Dynamics Using Committee Machines.- A Flexible and Scalable Access Control for Ubiquitous Computing Environments.- A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society.- Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection.- Intelligence Use of Unstructured Data in a Data Warehouse Environment.- An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems.- Classification of Threats Via a Multi-sensor Security Portal.- Exploring the Detection Process: Integrating Judgment and Outcome Decomposition.- Issues in Merging Internet Autonomous Systems for Emergency Communications.- CWME: A Framework of Group Support System for Emergency Responses.- Abnormal Detection Algorithm Based on Match Range Model.- Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks.- A PCA-LVQ Model for Intrusion Alert Analysis.- A Formalized Taxonomy of DDoS Attacks Based on Similarity.- Practical Intrusion Detection Using Genetic-Clustering.- An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach.- Design and Implementation of FPGA Based High-Performance Intrusion Detection System.- Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis.- Detecting Anomalies in Cargo Using Graph Properties.- Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.- Email Worm Detection Using Naïve Bayes and Support Vector Machine.- An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.- A New Methodology of Analyzing Security Vulnerability for Network Services.- Using One-Time Password Based Authentication for Wireless IP Network.- Experimental Study on Wireless Sensor Network Security.- Terrorist Database: A Bangladesh Study.- Terrorist Organizations and Effects of Terrorism in Bangladesh.- Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight.- The Role of Information Superiority in the Global War on Terrorism.- A Trust-Based Security Architecture for Ubiquitous Computing Systems.- A Trust Model for Uncertain Interactions in Ubiquitous Environments.- A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles.- A Home Firewall Solution for Securing Smart Spaces.- The Security Performance Evaluation of Digital Watermarking.- A Novel Key Release Scheme from Biometrics.- Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases.