Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006.

Cover
Sharad Mehrotra
Springer Science & Business Media, 11.05.2006 - 772 Seiten
In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conf- ence series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California, in May 2006. In addition to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and infor- tion technologies and tools.
 

Ausgewählte Seiten

Inhalt

Long Papers
1
Towards Automatic Event Tracking
26
Semantic Analytics Visualization
48
A DictionaryBased Approach to Fast and Accurate Name Matching
72
Analyzing Entities and Topics in News Articles Using Statistical Topic
93
An Integrated Information Fusion
105
Access Control Privacy and Cyber Trust
117
Design and Implementation of a PolicyBased Privacy Authorization
129
Emerging Applications
420
Multiperspective Video Analysis of Persons and Vehicles for Enhanced
440
An Embedded Bayesian Network Hidden Markov Model for Digital
459
From Information Processing
473
Suspect Tracking Using Semantic Data in a Multimedia
492
Personal Information Management PIM for Intelligence Analysis
510
Access Control Requirements for Preventing Insider Threats
529
A New Measure and
542

Privacy Preserving DBSCAN for Vertically Partitioned Data
141
Inferring Privacy Information from Social Networks
154
Surveillance and Emergency Response
166
Adaptive Method for Monitoring Network and Early Detection
178
Measures to Detect Word Substitution in Intercepted Communication
190
Finding Hidden Group Structure in a Stream of Communications
201
Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist
225
A Simulation Framework for Emergency Response Drills
237
Infrastructure Protection and Cyber Security
261
An Agent Based Approach
285
Suspect Vehicle Identification for Border Safety with Modified Mutual
308
Data Information and Knowledge Management
316
Terrorism Informatics and Countermeasures
331
Measuring Effectiveness of Antiterrorism Programs Using Performance
355
On the Topology of the Dark Web of Terrorist Groups
367
Practical Algorithms for Destabilizing Terrorist Networks
389
A First Look at Domestic and International Global Terrorism Events
407
Worm Traffic Modeling for Network Performance Analysis
578
Distributing the Cost of Securing a Transportation Infrastructure
596
Rational Choice Deterrence and Israeli CounterTerrorism
609
Emerging Applications
627
Using Author Topic to Detect Insider Threats from Email Traffic
642
Privacy Preserving Mining of Global Association Rules on Distributed
654
A Childs Story to Illustrate Automated Reasoning Systems Using
668
Advanced Patterns and Matches in Link Analysis
682
A Flexible ContextAware Authorization Framework for Mediation
684
Classification of Threats Via a Multisensor Security Portal
699
A Framework of Group Support System for Emergency
706
Practical Intrusion Detection Using GeneticClustering
720
Email Worm Detection Using Naıve Bayes and Support Vector Machine
733
An Anomaly Detection Algorithm for Detecting Attacks in Wireless
735
Decider Track a Revolutionary CyberTracker for Antiterrorist Fight
748
A Home Firewall Solution for Securing Smart Spaces
760
Urheberrecht

Andere Ausgaben - Alle anzeigen

Häufige Begriffe und Wortgruppen

Bibliografische Informationen