Jetzt 20% Rabatt auf alle English Books. Jetzt in über 4 Millionen Büchern stöbern und profitieren!
Willkommen, schön sind Sie da!
Logo Ex Libris

Intelligence and Security Informatics

  • Kartonierter Einband
  • 696 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information... Weiterlesen
165.00 CHF 132.00
Sie sparen CHF 33.00
Print on Demand - Auslieferung erfolgt in der Regel innert 4 bis 6 Wochen.
Bestellung & Lieferung in eine Filiale möglich


Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).

Hsinchun Chen is McClelland Professor of Management Information Systems (MIS) at the Eller College of the University of Arizona and Andersen Consulting Professor of the Year (1999). He is the author of 15 books and more than 200 articles covering knowledge management, digital library, homeland security, Web computing, and biomedical informatics in leading information technology publications. He serves on ten editorial boards, including: Journal of the American Society for Information Science and Technology, ACM Transactions on Information Systems, IEEE Transactions on Systems, Man, and Cybernetics, IEEE Transactions on Intelligent Transportation Systems, International Journal of Digital Library, and Decision Support Systems. He has served as a Scientific Advisor/Counselor of the National Library of Medicine (USA), Academia Sinica (Taiwan), and National Library of China (China). Dr. Chen founded The University of Arizona Artificial Intelligence Lab in 1990. The group is distinguished for its applied and high-impact AI research. Since 1990, Dr. Chen has received more than $20M in research funding from various government agencies and major corporations. He has been a PI of the NSF Digital Library Initiative Program and the NIH NLM s Biomedical Informatics Program. His group has developed advanced medical digital library and data and text mining techniques for gene pathway and disease informatics analysis and visualization since 1995. Dr. Chen s nanotechnology patent analysis works, funded by NSF, have been published in the Journal of Nanoparticle Research. His research findings were used in the President s Council of Advisors in Science and Technology s report on "The National Nanotechnology Initiative at Five Years: Assessment and Recommendations of the National Nanotechnology Advisory Panel." Dr. Chen s work also has been recognized by major US corporations and been awarded numerous industry awards for his contribution to IT education and research, including: ATT Foundation Award in Science and Engineering and SAP Award in Research/Applications. Dr. Chen has been heavily involved in fostering digital library, medical informatics, knowledge management, and intelligence informatics research and education in the US and internationally. He has been a PI for more than 20 NSF and NIH research grants since 1990. Dr. Chen is conference chair of ACM/IEEE Joint Conference on Digital Libraries (JCDL) 2004 and has served as the conference general chair or international program committee chair for the past six International Conferences of Asian Digital Libraries (ICADL), 1998-2005. He has been instrumental in fostering the ICADL activities in Asia. Dr. Chen is the founder and also conference co-chair of the IEEE International Conference on Intelligence and Security Informatics (ISI), 2003-2006. The ISI conference has become the premiere meeting for international, national, and homeland security IT research. Dr. Chen is an IEEE fellow.

Long Papers.- Collusion Set Detection Through Outlier Discovery.- Digging in the Details: A Case Study in Network Data Mining.- Efficient Identification of Overlapping Communities.- Event-Driven Document Selection for Terrorism Information Extraction.- Link Analysis Tools for Intelligence and Counterterrorism.- Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature.- Private Mining of Association Rules.- Design Principles of Coordinated Multi-incident Emergency Response Systems.- Multi-modal Biometrics with PKI Technologies for Border Control Applications.- Risk Management Using Behavior Based Bayesian Networks.- Sensitivity Analysis of an Attack Containment Model.- Toward a Target-Specific Method of Threat Assessment.- Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts.- Integrating Private Databases for Data Analysis.- Applying Authorship Analysis to Arabic Web Content.- Automatic Extraction of Deceptive Behavioral Cues from Video.- Automatically Determining an Anonymous Author's Native Language.- A Cognitive Model for Alert Correlation in a Distributed Environment.- Beyond Keyword Filtering for Message and Conversation Detection.- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).- Modeling and Multiway Analysis of Chatroom Tensors.- Selective Fusion for Speaker Verification in Surveillance.- A New Conceptual Framework to Resolve Terrorism's Root Causes.- Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.- A Conceptual Model of Counterterrorist Operations.- Measuring Success in Countering Terrorism: Problems and Pitfalls.- Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.- Testing a Rational Choice Model of Airline Hijackings.- Short Papers.- Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.- Discovering Identity Problems: A Case Study.- Efficient Discovery of New Information in Large Text Databases.- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.- LSI-Based Taxonomy Generation: The Taxonomist System.- Some Marginal Learning Algorithms for Unsupervised Problems.- Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.- Evaluating an Infectious Disease Information Sharing and Analysis System.- How Question Answering Technology Helps to Locate Malevolent Online Content.- Information Supply Chain: A Unified Framework for Information-Sharing.- Map-Mediated GeoCollaborative Crisis Management.- Thematic Indicators Derived from World News Reports.- A Novel Watermarking Algorithm Based on SVD and Zernike Moments.- A Survey of Software Watermarking.- Data Distortion for Privacy Protection in a Terrorist Analysis System.- Deception Across Cultures: Bottom-Up and Top-Down Approaches.- Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.- Active Automation of the DITSCAP.- An Ontological Approach to the Document Access Problem of Insider Threat.- Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.- Intrusion Detection System Using Sequence and Set Preserving Metric.- The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.- Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.- A Jackson Network-Based Model for Quantitative Analysis of Network Security.- Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.- CODESSEAL: Compiler/FPGA Approach to Secure Applications.- Computational Tool in Infrastructure Emergency Total Evacuation Analysis.- Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.- A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.- Connections in the World of International Terrorism.- Forecasting Terrorism: Indicators and Proven Analytic Techniques.- Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN.- The Qualitative Challenge of Insurgency Informatics.- The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.- Extended Abstracts for Posters and Demos.- A Group Decision-Support Method for Search and Rescue Based on Markov Chain.- A New Relationship Form in Data Mining.- A Study of Root Causes of Conflict Using Latent Semantic Analysis.- An Empirical Study on Dynamic Effects on Deception Detection.- Anti Money Laundering Reporting and Investigation Sorting the Wheat from the Chaff.- Application of Latent Semantic Indexing to Processing of Noisy Text.- Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques.- Mining Schemas in Semistructured Data Using Fuzzy Decision Trees.- More Than a Summary: Stance-Shift Analysis.- Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots.- BioPortal: Sharing and Analyzing Infectious Disease Information.- DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information.- Processing High-Speed Intelligence Feeds in Real-Time.- Question Answer TARA: A Terrorism Activity Resource Application.- Template Based Semantic Similarity for Security Applications.- The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web.- Toward an ITS Specific Knowledge Engine.- A Blind Image Watermarking Using for Copyright Protection and Tracing.- Towards an Effective Wireless Security Policy for Sensitive Organizations.- A Taxonomy of Cyber Attacks on 3G Networks.- An Adaptive Approach to Handle DoS Attack for Web Services.- An Architecture for Network Security Using Feedback Control.- Defending a Web Browser Against Spying with Browser Helper Objects.- Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet.- Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel.- Gathering Digital Evidence in Response to Information Security Incidents.- On the QP Algorithm in Software Watermarking.- On the Use of Opaque Predicates in Mobile Agent Code Obfuscation.- Secure Contents Distribution Using Flash Memory Technology.- Infrastructure Protection and Emergency Response.- Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities.- Securing Grid-Based Critical Infrastructures.- The Safety Alliance of Cushing A Model Example of Cooperation as an Effective Counterterrorism Tool.- Surveillance, Border Protection, and Transportation Systems.- A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques.- An Agent-Based Framework for a Traffic Security Management System.- Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle.- Application of Cooperative Co-evolution in Pedestrian Detection Systems.- Biometric Fingerprints Based Radio Frequency Identification.- BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.


Titel: Intelligence and Security Informatics
Untertitel: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings
EAN: 9783540259992
ISBN: 3540259996
Format: Kartonierter Einband
Herausgeber: Springer Berlin Heidelberg
Genre: Informatik
Anzahl Seiten: 696
Gewicht: 1036g
Größe: H235mm x B155mm x T37mm
Jahr: 2005
Untertitel: Englisch
Auflage: 2005

Weitere Produkte aus der Reihe "Information Systems and Applications, incl. Internet/Web, and HCI"