|
Abstracts of Plenary Talks |
|
|
|
Intelligent Social Network Modeling and Analysis for Security Informatics |
|
|
1 | (2) |
|
|
Nature Inspired Online Real Risk Assessment Models for Security Systems |
|
|
3 | (1) |
|
|
Homeland Security Data Mining Using Social Network Analysis |
|
|
4 | (1) |
|
|
Criminal and Social Network Analysis |
|
|
|
The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data |
|
|
5 | (10) |
|
|
|
|
An Information Theory Approach to Identify Sets of Key Players |
|
|
15 | (12) |
|
|
|
Locating Key Actors in Social Networks Using Bayes' Posterior Probability Framework |
|
|
27 | (12) |
|
|
|
Computational Modeling of Criminal Activity |
|
|
39 | (12) |
|
|
|
Intelligence Analysis and Knowledge Discovery |
|
|
|
SPYWatch, Overcoming Linguistic Barriers in Information Management |
|
|
51 | (10) |
|
|
|
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary |
|
|
61 | (12) |
|
|
Buzz Monitoring in Word Space |
|
|
73 | (12) |
|
|
|
Web-Based Intelligence Monitoring and Analysis |
|
|
|
Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study |
|
|
85 | (12) |
|
|
Mapping Dark Web Geolocation |
|
|
97 | (11) |
|
|
|
Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study |
|
|
108 | (11) |
|
|
|
Privacy Protection Access Control and |
|
|
|
Digital Rights Management |
|
|
Access Control of Federated Information Systems |
|
|
119 | (12) |
|
Aneta Poniszewska-Maranda |
|
|
Designing Information Systems Which Manage or Avoid Privacy Incidents |
|
|
131 | (12) |
|
|
|
|
Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication |
|
|
143 | (12) |
|
|
Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transform |
|
|
155 | (10) |
|
|
|
|
Problem Analyses and Recommendations in DRM Security Policies |
|
|
165 | (14) |
|
|
|
|
|
Malware and Intrusion Detection |
|
|
|
A Distributed Framework for the Detection of New Worm-Related Malware |
|
|
179 | (12) |
|
|
|
|
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures |
|
|
191 | (13) |
|
|
|
|
|
Unknown Malcode Detection Using OPCODE Representation |
|
|
204 | (12) |
|
|
|
|
|
|
|
|
Surveillance and Crisis Management |
|
|
|
Mobile and Stationary Sensors for Local Surveillance: System Architecture and Applications |
|
|
216 | (10) |
|
|
|
|
Fuzzy Distributed Workflows for Crisis Management Decision Makers |
|
|
226 | (11) |
|
|
|
|
Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms |
|
|
237 | (11) |
|
|
|
|
An Information Systems Design Theory for Supporting WMD Knowledge Reachback |
|
|
248 | (12) |
|
|
|
Thomas George Kannampallil |
|
|
Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation |
|
|
260 | (11) |
|
|
Thomas George Kannampallil |
|
|
|
|
|
|
|
Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-Terrorism Campaigns |
|
|
271 | (3) |
|
|
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests |
|
|
274 | (3) |
|
|
Author Index |
|
277 | |