|
|
|
|
|
Collusion Set Detection Through Outlier Discovery |
|
|
1 | (13) |
|
|
|
|
|
Digging in the Details: A Case Study in Network Data Mining |
|
|
14 | (13) |
|
|
|
Efficient Identification of Overlapping Communities |
|
|
27 | (10) |
|
|
|
|
Event-Driven Document Selection for Terrorism Information Extraction |
|
|
37 | (12) |
|
|
|
|
|
|
Link Analysis Tools for Intelligence and Counterterrorism |
|
|
49 | (11) |
|
|
|
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature |
|
|
60 | (12) |
|
|
|
|
|
Private Mining of Association Rules |
|
|
72 | (9) |
|
|
|
|
Infrastructure Protection and Emergency Response |
|
|
|
Design Principles of Coordinated Multi-incident Emergency Response Systems |
|
|
81 | (18) |
|
|
|
|
|
Multi-modal Biometrics with PKI Technologies for Border Control Applications |
|
|
99 | (16) |
|
|
|
Risk Management Using Behavior Based Bayesian Networks |
|
|
115 | (12) |
|
|
|
Sensitivity Analysis of an Attack Containment Model |
|
|
127 | (12) |
|
|
|
|
Toward a Target-Specific Method of Threat Assessment |
|
|
139 | (14) |
|
|
|
|
Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts |
|
|
153 | (18) |
|
|
Integrating Private Databases for Data Analysis |
|
|
171 | (12) |
|
|
|
|
Deception Detection and Authorship Analysis |
|
|
|
Applying Authorship Analysis to Arabic Web Content |
|
|
183 | (15) |
|
|
|
Automatic Extraction of Deceptive Behavioral Cues from Video |
|
|
198 | (11) |
|
|
|
|
|
|
Automatically Determining an Anonymous Author's Native Language |
|
|
209 | (9) |
|
|
|
|
Monitoring and Surveillance |
|
|
|
A Cognitive Model for Alert Correlation in a Distributed Environment |
|
|
218 | (13) |
|
|
|
Beyond Keyword Filtering for Message and Conversation Detection |
|
|
231 | (13) |
|
|
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS) |
|
|
244 | (12) |
|
|
|
|
Omer Zaafrany Menahem Friedman |
|
|
|
|
Modeling and Multiway Analysis of Chatroom Tensors |
|
|
256 | (13) |
|
|
|
|
|
Selective Fusion for Speaker Verification in Surveillance |
|
|
269 | (11) |
|
|
|
|
|
A New Conceptual Framework to Resolve Terrorism's Root Causes |
|
|
280 | (7) |
|
|
Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network |
|
|
287 | (18) |
|
|
|
|
|
|
A Conceptual Model of Counterterrorist Operations |
|
|
305 | (11) |
|
|
|
|
|
|
Measuring Success in Countering Terrorism: Problems and Pitfalls |
|
|
316 | (6) |
|
|
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis |
|
|
322 | (18) |
|
|
|
Testing a Rational Choice Model of Airline Hijackings |
|
|
340 | (22) |
|
|
|
|
|
|
|
|
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms |
|
|
362 | (6) |
|
|
|
Discovering Identity Problems: A Case Study |
|
|
368 | (6) |
|
|
|
|
|
Efficient Discovery of New Information in Large Text Databases |
|
|
374 | (7) |
|
|
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content |
|
|
381 | (8) |
|
|
|
|
|
LSI-Based Taxonomy Generation: The Taxonomist System |
|
|
389 | (6) |
|
|
Some Marginal Learning Algorithms for Unsupervised Problems |
|
|
395 | (7) |
|
|
|
|
|
Information Management and Sharing |
|
|
|
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites |
|
|
402 | (10) |
|
|
|
|
|
|
|
|
Evaluating an Infectious Disease Information Sharing and Analysis System |
|
|
412 | (6) |
|
|
|
|
|
|
|
How Question Answering Technology Helps to Locate Malevolent Online Content |
|
|
418 | (4) |
|
|
Jose Antonio Robles-Flores |
|
|
Information Supply Chain: A Unified Framework for Information-Sharing |
|
|
422 | (7) |
|
|
|
Map-Mediated GeoCollaborative Crisis Management |
|
|
429 | (7) |
|
|
|
|
|
|
|
Thematic Indicators Derived from World News Reports |
|
|
436 | (12) |
|
|
|
|
Copyright and Privacy Protection |
|
|
|
A Novel Watermarking Algorithm Based on SVD and Zernike Moments |
|
|
448 | (6) |
|
|
|
|
|
A Survey of Software Watermarking |
|
|
454 | (5) |
|
|
|
|
Data Distortion for Privacy Protection in a Terrorist Analysis System |
|
|
459 | (6) |
|
|
|
|
|
|
|
Deception Across Cultures: Bottom-Up and Top-Down Approaches |
|
|
465 | (6) |
|
|
|
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling |
|
|
471 | (8) |
|
|
|
|
|
|
Information Security and Intrusion Detection |
|
|
|
Active Automation of the DITSCAP |
|
|
479 | (7) |
|
|
|
|
|
An Ontological Approach to the Document Access Problem of Insider Threat |
|
|
486 | (6) |
|
|
|
|
|
|
Filtering Fusion and Dynamic Information Presentation: Towards a General Information Firewall |
|
|
492 | (6) |
|
|
|
|
Intrusion Detection System Using Sequence and Set Preserving Metric |
|
|
498 | (7) |
|
|
|
|
|
|
The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level |
|
|
505 | (6) |
|
|
|
|
|
Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation |
|
|
511 | (6) |
|
|
|
|
Infrastructure Protection and Emergency Response |
|
|
|
A Jackson Network-Based Model for Quantitative Analysis of Network Security |
|
|
517 | (6) |
|
|
|
|
|
Biomonitoring Phylogenetics and Anomaly Aggregation Systems |
|
|
523 | (7) |
|
|
|
CODESSEAL: Compiler/FPGA Approach to Secure Applications |
|
|
530 | (6) |
|
|
|
|
|
|
|
Computational Tool in Infrastructure Emergency Total Evacuation Analysis |
|
|
536 | (7) |
|
|
|
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security |
|
|
543 | (6) |
|
|
|
|
|
|
|
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems |
|
|
549 | (5) |
|
|
|
|
|
|
|
|
Connections in the World of International Terrorism |
|
|
554 | (7) |
|
|
Forecasting Terrorism: Indicators and Proven Analytic Techniques |
|
|
561 | (6) |
|
|
Forecasting Terrorist Groups' Warfare: `Conventional' to CBRN |
|
|
567 | (4) |
|
|
The Qualitative Challenge of Insurgency Informatics |
|
|
571 | (8) |
|
|
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events |
|
|
579 | (11) |
|
|
Part III: Extended Abstracts for Posters and Demos |
|
|
|
|
|
A Group Decision-Support Method for Search and Rescue Based on Markov Chain |
|
|
590 | (3) |
|
|
|
|
A New Relationship Form in Data Mining |
|
|
593 | (2) |
|
|
|
A Study of ``Root Causes of Conflict'' Using Latent Semantic Analysis |
|
|
595 | (2) |
|
|
|
|
|
An Empirical Study on Dynamic Effects on Deception Detection |
|
|
597 | (3) |
|
|
|
Anti Money Laundering Reporting and Investigation -- Sorting the Wheat from the Chaff |
|
|
600 | (2) |
|
|
|
Application of Latent Semantic Indexing to Processing of Noisy Text |
|
|
602 | (2) |
|
|
|
Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques |
|
|
604 | (2) |
|
|
|
|
Mining Schemas in Semistructured Data Using Fuzzy Decision Trees |
|
|
606 | (2) |
|
|
|
More Than a Summary: Stance-Shift Analysis |
|
|
608 | (2) |
|
|
|
|
Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots |
|
|
610 | (2) |
|
|
Information Management and Sharing |
|
|
|
BioPortal: Sharing and Analyzing Infectious Disease Information |
|
|
612 | (2) |
|
|
|
|
|
|
|
|
|
|
Diane: Revolutionizing the Way We Collect, Analyze, and Share Information |
|
|
614 | (3) |
|
|
Processing High-Speed Intelligence Feeds in Real-Time |
|
|
617 | (2) |
|
|
|
|
|
Question Answer Tara: A Terrorism Activity Resource Application |
|
|
619 | (2) |
|
|
|
Template Based Semantic Similarity for Security Applications |
|
|
621 | (2) |
|
|
Christian Halaschek-Wiener |
|
|
|
|
|
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web |
|
|
623 | (2) |
|
|
|
|
|
|
|
Toward an ITS Specific Knowledge Engine |
|
|
625 | (2) |
|
|
|
Information Security and Intrusion Detection |
|
|
|
A Blind Image Watermarking Using for Copyright Protection and Tracing |
|
|
627 | (2) |
|
|
|
|
|
Towards an Effective Wireless Security Policy for Sensitive Organizations |
|
|
629 | (2) |
|
|
|
|
|
A Taxonomy of Cyber Attacks on 3G Networks |
|
|
631 | (3) |
|
|
|
|
|
An Adaptive Approach to Handle DoS Attack for Web Services |
|
|
634 | (2) |
|
|
|
An Architecture for Network Security Using Feedback Control |
|
|
636 | (2) |
|
|
|
Defending a Web Browser Against Spying with Browser Helper Objects |
|
|
638 | (2) |
|
|
|
|
|
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet |
|
|
640 | (2) |
|
|
|
|
Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel |
|
|
642 | (2) |
|
|
|
Gathering Digital Evidence in Response to Information Security Incidents |
|
|
644 | (2) |
|
|
|
On the QP Algorithm in Software Watermarking |
|
|
646 | (2) |
|
|
|
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation |
|
|
648 | (2) |
|
|
|
Secure Contents Distribution Using Flash Memory Technology |
|
|
650 | (2) |
|
|
|
Infrastructure Protection and Emergency Response |
|
|
|
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities |
|
|
652 | (2) |
|
|
Securing Grid-Based Critical Infrastructures |
|
|
654 | (2) |
|
|
|
The Safety Alliance of Cushing -- A Model Example of Cooperation as an Effective Counterterrorism Tool |
|
|
656 | (2) |
|
|
Surveillance, Border Protection, and Transportation Systems |
|
|
|
A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques |
|
|
658 | (2) |
|
|
|
An Agent-Based Framework for a Traffic Security Management System |
|
|
660 | (2) |
|
|
|
Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle |
|
|
662 | (2) |
|
|
|
|
Application of Cooperative Co-evolution in Pedestrian Detection Systems |
|
|
664 | (2) |
|
|
|
|
|
Biometric Fingerprints Based Radio Frequency Identification |
|
|
666 | (3) |
|
|
Chandramohan Senthilkumar |
|
|
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization |
|
|
669 | (2) |
|
|
|
|
|
|
|
|
|
Author Index |
|
671 | |