Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006.Sharad Mehrotra Springer Science & Business Media, 11.05.2006 - 772 Seiten In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conf- ence series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California, in May 2006. In addition to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and infor- tion technologies and tools. |
Inhalt
Long Papers | 1 |
Towards Automatic Event Tracking | 26 |
Semantic Analytics Visualization | 48 |
A DictionaryBased Approach to Fast and Accurate Name Matching | 72 |
Analyzing Entities and Topics in News Articles Using Statistical Topic | 93 |
An Integrated Information Fusion | 105 |
Access Control Privacy and Cyber Trust | 117 |
Design and Implementation of a PolicyBased Privacy Authorization | 129 |
Emerging Applications | 420 |
Multiperspective Video Analysis of Persons and Vehicles for Enhanced | 440 |
An Embedded Bayesian Network Hidden Markov Model for Digital | 459 |
From Information Processing | 473 |
Suspect Tracking Using Semantic Data in a Multimedia | 492 |
Personal Information Management PIM for Intelligence Analysis | 510 |
Access Control Requirements for Preventing Insider Threats | 529 |
A New Measure and | 542 |
Privacy Preserving DBSCAN for Vertically Partitioned Data | 141 |
Inferring Privacy Information from Social Networks | 154 |
Surveillance and Emergency Response | 166 |
Adaptive Method for Monitoring Network and Early Detection | 178 |
Measures to Detect Word Substitution in Intercepted Communication | 190 |
Finding Hidden Group Structure in a Stream of Communications | 201 |
Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist | 225 |
A Simulation Framework for Emergency Response Drills | 237 |
Infrastructure Protection and Cyber Security | 261 |
An Agent Based Approach | 285 |
Suspect Vehicle Identification for Border Safety with Modified Mutual | 308 |
Data Information and Knowledge Management | 316 |
Terrorism Informatics and Countermeasures | 331 |
Measuring Effectiveness of Antiterrorism Programs Using Performance | 355 |
On the Topology of the Dark Web of Terrorist Groups | 367 |
Practical Algorithms for Destabilizing Terrorist Networks | 389 |
A First Look at Domestic and International Global Terrorism Events | 407 |
Worm Traffic Modeling for Network Performance Analysis | 578 |
Distributing the Cost of Securing a Transportation Infrastructure | 596 |
Rational Choice Deterrence and Israeli CounterTerrorism | 609 |
Emerging Applications | 627 |
Using Author Topic to Detect Insider Threats from Email Traffic | 642 |
Privacy Preserving Mining of Global Association Rules on Distributed | 654 |
A Childs Story to Illustrate Automated Reasoning Systems Using | 668 |
Advanced Patterns and Matches in Link Analysis | 682 |
A Flexible ContextAware Authorization Framework for Mediation | 684 |
Classification of Threats Via a Multisensor Security Portal | 699 |
A Framework of Group Support System for Emergency | 706 |
Practical Intrusion Detection Using GeneticClustering | 720 |
Email Worm Detection Using Naıve Bayes and Support Vector Machine | 733 |
An Anomaly Detection Algorithm for Detecting Attacks in Wireless | 735 |
Decider Track a Revolutionary CyberTracker for Antiterrorist Fight | 748 |
A Home Firewall Solution for Securing Smart Spaces | 760 |
Andere Ausgaben - Alle anzeigen
Intelligence and Security Informatics: IEEE International Conference on ... Sharad Mehrotra,Daniel D. Zeng,Hsinchun Chen Eingeschränkte Leseprobe - 2006 |
Häufige Begriffe und Wortgruppen
access control activity agent alert algorithm analysis analyze application approach attribute Bayesian Bayesian network Berlin Heidelberg 2006 bioterrorism CCDFs classified clusters collection communication components Computer correlation criminal Data Mining database dataset detection distribution document dynamic entities evaluation event evolution relationships example extracted extremist forums fractal fractal views function graph groups hypernym identify IEEE incident infected inference Intelligence interaction International Internet itemsets LNCS measures Mehrotra method mutual information neural network nodes objects organizations OS-level paper parameters patterns performance potential problem proposed query R-Tree scenarios semantic Semantic Web sensor server simulation social network specific Springer-Verlag Berlin Heidelberg structure surveillance target techniques Technology terrorist threat threshold topic tree trust negotiation types University of Arizona unsupervised learning vectors Venn Diagram videos visualization Web mining websites worm traffic