Atnaujinkite slapukų nuostatas

El. knyga: Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 3495
  • Išleidimo metai: 25-Apr-2005
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783540320630
Kitos knygos pagal šią temą:
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 3495
  • Išleidimo metai: 25-Apr-2005
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783540320630
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).
Part I: Long Papers
Data and Text Mining
Collusion Set Detection Through Outlier Discovery
1(13)
Vandana P. Janeja
Vijayalakshmi Atluri
Jaideep Vaidya
Nabil R. Adam
Digging in the Details: A Case Study in Network Data Mining
14(13)
John Galloway
Simeon J. Simoff
Efficient Identification of Overlapping Communities
27(10)
Jeffrey Baumes
Mark Goldberg
Malik Magdon-Ismail
Event-Driven Document Selection for Terrorism Information Extraction
37(12)
Zhen Sun
Ee-Peng Lim
Kuiyu Chang
Teng-Kwee Ong
Rohan K. Gunaratna
Link Analysis Tools for Intelligence and Counterterrorism
49(11)
Antonio Badia
Mehmed Kantardzic
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature
60(12)
Xiaohua Hu
Illhoi Yoo
Peter Rumm
Michael Atwood
Private Mining of Association Rules
72(9)
Justin Zhan
Stan Matwin
LiWu Chang
Infrastructure Protection and Emergency Response
Design Principles of Coordinated Multi-incident Emergency Response Systems
81(18)
Rui Chen
Raj Sharman
H. Raghav Rao
Shambhu J. Upadhyaya
Multi-modal Biometrics with PKI Technologies for Border Control Applications
99(16)
Taekyoung Kwon
Hyeonjoon Moon
Risk Management Using Behavior Based Bayesian Networks
115(12)
Ram Dantu
Prakash Kolan
Sensitivity Analysis of an Attack Containment Model
127(12)
Ram Dantu
Joao Cangussu
Janos Turi
Toward a Target-Specific Method of Threat Assessment
139(14)
Yael Shahar
Information Management
Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts
153(18)
Don Radlauer
Integrating Private Databases for Data Analysis
171(12)
Ke Wang
Benjamin C.M. Fung
Guozhu Dong
Deception Detection and Authorship Analysis
Applying Authorship Analysis to Arabic Web Content
183(15)
Ahmed Abbasi
Hsinchun Chen
Automatic Extraction of Deceptive Behavioral Cues from Video
198(11)
Thomas O. Meservy
Matthew L. Jensen
John Kruse
Judee K. Burgoon
Jay F. Nunamaker
Automatically Determining an Anonymous Author's Native Language
209(9)
Moshe Koppel
Jonathan Schler
Kfir Zigdon
Monitoring and Surveillance
A Cognitive Model for Alert Correlation in a Distributed Environment
218(13)
Ambareen Siraj
Rayford B. Vaughn
Beyond Keyword Filtering for Message and Conversation Detection
231(13)
David B. Skillicorn
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)
244(12)
Yuval Elovici
Bracha Shapira
Mark Last
Omer Zaafrany Menahem Friedman
Moti Schneider
Abraham Kandel
Modeling and Multiway Analysis of Chatroom Tensors
256(13)
Evrim Acar
Seyit A. Camtepe
Mukkai S. Krishnamoorthy
Bulent Yener
Selective Fusion for Speaker Verification in Surveillance
269(11)
Yosef A. Solewicz
Moshe Koppel
Terrorism Informatics
A New Conceptual Framework to Resolve Terrorism's Root Causes
280(7)
Joshua Sinai
Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network
287(18)
Jialun Qin
Jennifer J. Xu
Daning Hu
Marc Sageman
Hsinchun Chen
A Conceptual Model of Counterterrorist Operations
305(11)
David Davis
Allison Frendak-Blume
Jennifer Wheeler
Alexander E.R. Woodcock
Clarence Worrell III
Measuring Success in Countering Terrorism: Problems and Pitfalls
316(6)
Peter S. Probst
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis
322(18)
Edna Reid
Hsinchun Chen
Testing a Rational Choice Model of Airline Hijackings
340(22)
Laura Dugan
Gary LaFree
Alex R. Piquero
Part II: Short Papers
Data and Text Mining
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms
362(6)
H. Gunes Kayacik
Nur Zincir-Heywood
Discovering Identity Problems: A Case Study
368(6)
Alan G. Wang
Homa Atabakhsh
Tim Petersen
Hsinchun Chen
Efficient Discovery of New Information in Large Text Databases
374(7)
R.B. Bradford
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
381(8)
Ozgur Yilmazel
Svetlana Symonenko
Niranjan Balasubramanian
Elizabeth D. Liddy
LSI-Based Taxonomy Generation: The Taxonomist System
389(6)
Janusz Wnek
Some Marginal Learning Algorithms for Unsupervised Problems
395(7)
Qing Tao
Gao-Wei Wu
Fei-Yue Wang
Jue Wang
Information Management and Sharing
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
402(10)
Edna Reid
Jialun Qin
Yilu Zhou
Guanpi Lai
Marc Sageman
Gabriel Weimann
Hsinchun Chen
Evaluating an Infectious Disease Information Sharing and Analysis System
412(6)
Paul J.-H. Hu
Daniel Zeng
Hsinchun Chen
Catherine Larson
Wei Chang
Chunju Tseng
How Question Answering Technology Helps to Locate Malevolent Online Content
418(4)
Dmitri Roussinov
Jose Antonio Robles-Flores
Information Supply Chain: A Unified Framework for Information-Sharing
422(7)
Shuang Sun
John Yen
Map-Mediated GeoCollaborative Crisis Management
429(7)
Guoray Cai
Alan M. MacEachren
Isaac Brewer
Mike McNeese
Rajeev Sharma
Sven Fuhrmann
Thematic Indicators Derived from World News Reports
436(12)
Clive Best
Erik Van der Goot
Monica de Paola
Copyright and Privacy Protection
A Novel Watermarking Algorithm Based on SVD and Zernike Moments
448(6)
Haifeng Li
Shuxun Wang
Weiwei Song
Quan Wen
A Survey of Software Watermarking
454(5)
William Zhu
Clark Thomborson
Fei-Yue Wang
Data Distortion for Privacy Protection in a Terrorist Analysis System
459(6)
Shuting Xu
Jun Zhang
Dianwei Han
Jie Wang
Deception Detection
Deception Across Cultures: Bottom-Up and Top-Down Approaches
465(6)
Lina Zhou
Simon Lutterbie
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling
471(8)
Douglas P. Twitchell
Nicole Forsgren
Karl Wiers
Judee K. Burgoon
Jay F. Nunamaker Jr.
Information Security and Intrusion Detection
Active Automation of the DITSCAP
479(7)
Seok Won Lee
Robin A. Gandhi
Gail-Joon Ahn
Deepak S. Yavagal
An Ontological Approach to the Document Access Problem of Insider Threat
486(6)
Boanerges Aleman-Meza
Phillip Burns
Matthew Eavenson
Devanand Palaniswami
Amit Sheth
Filtering Fusion and Dynamic Information Presentation: Towards a General Information Firewall
492(6)
Gregory Conti
Mustaque Ahamad
Robert Norback
Intrusion Detection System Using Sequence and Set Preserving Metric
498(7)
Pradeep Kumar
M. Venkateswara Rao
P. Radha Krishna
Raju S. Bapi
Arijit Laha
The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level
505(6)
Yufeng Chen
Yabo Dong
Dongming Lu
Yunhe Pan
Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation
511(6)
Dae-Ki Kang
Doug Fuller
Vasant Honavar
Infrastructure Protection and Emergency Response
A Jackson Network-Based Model for Quantitative Analysis of Network Security
517(6)
Zhengtao Xiang
Yufeng Chen
Wei Jian
Fei Yan
Biomonitoring Phylogenetics and Anomaly Aggregation Systems
523(7)
David R.B. Stockwell
Jason T.L. Wang
CODESSEAL: Compiler/FPGA Approach to Secure Applications
530(6)
Olga Gelbart
Paul Ott
Bhagirath Narahari
Rahul Simha
Alok Choudhary
Joseph Zambreno
Computational Tool in Infrastructure Emergency Total Evacuation Analysis
536(7)
Kelvin H.L. Wong
Mingchun Luo
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
543(6)
Kripashankar Mohan
Bhagirath Narahari
Rahul Simha
Paul Ott
Alok Choudhary
Joseph Zambreno
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems
549(5)
Xinjian Chen
Jie Tian
Qi Su
Xin Yang
Fei-Yue Wang
Terrorism Informatics
Connections in the World of International Terrorism
554(7)
Yael Shahar
Forecasting Terrorism: Indicators and Proven Analytic Techniques
561(6)
Sundri K. Khalsa
Forecasting Terrorist Groups' Warfare: `Conventional' to CBRN
567(4)
Joshua Sinai
The Qualitative Challenge of Insurgency Informatics
571(8)
Scott Tousley
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events
579(11)
Robert J. Latino
Part III: Extended Abstracts for Posters and Demos
Data and Text Mining
A Group Decision-Support Method for Search and Rescue Based on Markov Chain
590(3)
Huizhang Shen
Jidi Zhao
Ying Peng
A New Relationship Form in Data Mining
593(2)
Suwimon Kooptiwoot
Muhammad Abdus Salam
A Study of ``Root Causes of Conflict'' Using Latent Semantic Analysis
595(2)
Mihaela Bobeica
Jean-Paul Jeral
Teofilo Garcia
Clive Best
An Empirical Study on Dynamic Effects on Deception Detection
597(3)
Tiantian Qin
Judee K. Burgoon
Anti Money Laundering Reporting and Investigation -- Sorting the Wheat from the Chaff
600(2)
Ana Isabel Canhoto
James Backhouse
Application of Latent Semantic Indexing to Processing of Noisy Text
602(2)
Robert J. Price
Anthony E. Zukas
Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques
604(2)
Nazli Goharian
Ling Ma
Chris Meyers
Mining Schemas in Semistructured Data Using Fuzzy Decision Trees
606(2)
Wei Sun
Da-xin Liu
More Than a Summary: Stance-Shift Analysis
608(2)
Boyd Davis
Vivian Lord
Peyton Mason
Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots
610(2)
Zeng-Guang Hou
Information Management and Sharing
BioPortal: Sharing and Analyzing Infectious Disease Information
612(2)
Daniel Zeng
Hsinchun Chen
Chunju Tseng
Catherine Larson
Wei Chang
Millicent Eidson
Ivan Gotham
Cecil Lynch
Michael Ascher
Diane: Revolutionizing the Way We Collect, Analyze, and Share Information
614(3)
Jin Zhu
Processing High-Speed Intelligence Feeds in Real-Time
617(2)
Alan Demers
Johannes Gehrke
Mingsheng Hong
Mirek Riedewald
Question Answer Tara: A Terrorism Activity Resource Application
619(2)
Rob Schumaker
Hsinchun Chen
Template Based Semantic Similarity for Security Applications
621(2)
Boanerges Aleman-Meza
Christian Halaschek-Wiener
Satya Sanket Sahoo
Amit Sheth
I. Budak Arpinar
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web
623(2)
Jialun Qin
Yilu Zhou
Guanpi Lai
Edna Reid
Marc Sageman
Hsinchun Chen
Toward an ITS Specific Knowledge Engine
625(2)
Guanpi Lai
Fei-Yue Wang
Information Security and Intrusion Detection
A Blind Image Watermarking Using for Copyright Protection and Tracing
627(2)
Haifeng Li
Shuxun Wang
Weiwei Song
Quan Wen
Towards an Effective Wireless Security Policy for Sensitive Organizations
629(2)
Michael Manley
Cheri McEntee
Anthony Molet
Joon S. Park
A Taxonomy of Cyber Attacks on 3G Networks
631(3)
Kameswari Kotapati
Peng Liu
Yan Sun
Thomas F. LaPorta
An Adaptive Approach to Handle DoS Attack for Web Services
634(2)
Eul Gyu Im
Yong Ho Song
An Architecture for Network Security Using Feedback Control
636(2)
Ram Dantu
Joao W. Cangussu
Defending a Web Browser Against Spying with Browser Helper Objects
638(2)
Beomsoo Park
Sungjin Hong
Jaewook Oh
Heejo Lee
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet
640(2)
ZhengYou Xia
YiChuan Jiang
Jian Wang
Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel
642(2)
Young-Hwan Oh
Hae-Young Bae
Gathering Digital Evidence in Response to Information Security Incidents
644(2)
Shiuh-Jeng Wang
Cheng-Hsing Yang
On the QP Algorithm in Software Watermarking
646(2)
William Zhu
Clark Thomborson
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation
648(2)
Anirban Majumdar
Clark Thomborson
Secure Contents Distribution Using Flash Memory Technology
650(2)
Yong Ho Song
Eul Gyu Im
Infrastructure Protection and Emergency Response
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities
652(2)
Richard A. Smith
Securing Grid-Based Critical Infrastructures
654(2)
Syed Naqvi
Michel Riguidel
The Safety Alliance of Cushing -- A Model Example of Cooperation as an Effective Counterterrorism Tool
656(2)
David Zimmermann
Surveillance, Border Protection, and Transportation Systems
A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques
658(2)
Xiaoyan Gong
Haijun Gao
An Agent-Based Framework for a Traffic Security Management System
660(2)
Shuming Tang
Haijun Gao
Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle
662(2)
Hong Qiao
Fei-Yue Wang
Xianbin Cao
Application of Cooperative Co-evolution in Pedestrian Detection Systems
664(2)
Xianbin Cao
Hong Qiao
Fei-Yue Wang
Xinzheng Zhang
Biometric Fingerprints Based Radio Frequency Identification
666(3)
Sundaram Jayakumar
Chandramohan Senthilkumar
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization
669(2)
Siddharth Kaza
Byron Marshall
Jennifer Xu
Alan G. Wang
Hemanth Gowda
Homa Atabakhsh
Tim Petersen
Chuck Violette
Hsinchun Chen
Author Index 671