Willkommen, schön sind Sie da!
Logo Ex Libris

Intelligence and Security Informatics

  • Kartonierter Einband
  • 800 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ... Weiterlesen
CHF 179.00
Print on Demand - Auslieferung erfolgt in der Regel innert 4 bis 6 Wochen.
Bestellung & Lieferung in eine Filiale möglich


In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conf- ence series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California, in May 2006. In addition to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and infor- tion technologies and tools.

Refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006

Presents 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts

Topics span the full range of intelligence and security

Hsinchun Chen is McClelland Professor of Management Information Systems (MIS) at the Eller College of the University of Arizona and Andersen Consulting Professor of the Year (1999). He is the author of 15 books and more than 200 articles covering knowledge management, digital library, homeland security, Web computing, and biomedical informatics in leading information technology publications. He serves on ten editorial boards, including: Journal of the American Society for Information Science and Technology, ACM Transactions on Information Systems, IEEE Transactions on Systems, Man, and Cybernetics, IEEE Transactions on Intelligent Transportation Systems, International Journal of Digital Library, and Decision Support Systems. He has served as a Scientific Advisor/Counselor of the National Library of Medicine (USA), Academia Sinica (Taiwan), and National Library of China (China). Dr. Chen founded The University of Arizona Artificial Intelligence Lab in 1990. The group is distinguished for its applied and high-impact AI research. Since 1990, Dr. Chen has received more than $20M in research funding from various government agencies and major corporations. He has been a PI of the NSF Digital Library Initiative Program and the NIH NLM s Biomedical Informatics Program. His group has developed advanced medical digital library and data and text mining techniques for gene pathway and disease informatics analysis and visualization since 1995. Dr. Chen s nanotechnology patent analysis works, funded by NSF, have been published in the Journal of Nanoparticle Research. His research findings were used in the President s Council of Advisors in Science and Technology s report on "The National Nanotechnology Initiative at Five Years: Assessment and Recommendations of the National Nanotechnology Advisory Panel." Dr. Chen s work also has been recognized by major US corporations and been awarded numerous industry awards for his contribution to IT education and research, including: ATT Foundation Award in Science and Engineering and SAP Award in Research/Applications. Dr. Chen has been heavily involved in fostering digital library, medical informatics, knowledge management, and intelligence informatics research and education in the US and internationally. He has been a PI for more than 20 NSF and NIH research grants since 1990. Dr. Chen is conference chair of ACM/IEEE Joint Conference on Digital Libraries (JCDL) 2004 and has served as the conference general chair or international program committee chair for the past six International Conferences of Asian Digital Libraries (ICADL), 1998-2005. He has been instrumental in fostering the ICADL activities in Asia. Dr. Chen is the founder and also conference co-chair of the IEEE International Conference on Intelligence and Security Informatics (ISI), 2003-2006. The ISI conference has become the premiere meeting for international, national, and homeland security IT research. Dr. Chen is an IEEE fellow.

Long Papers.- Computer-Mediated Collaborative Reasoning and Intelligence Analysis.- Using Importance Flooding to Identify Interesting Networks of Criminal Activity.- Towards Automatic Event Tracking.- Interactive Refinement of Filtering Queries on Streaming Intelligence Data.- Semantic Analytics Visualization.- Visualizing Authorship for Identification.- A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases.- Iterative Relational Classification Through ThreeState Epidemic Dynamics.- Analyzing Entities and Topics in News Articles Using Statistical Topic Models.- The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment.- Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders.- Design and Implementation of a Policy-Based Privacy Authorization System.- Privacy Preserving DBSCAN for Vertically Partitioned Data.- Inferring Privacy Information from Social Networks.- Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects.- Adaptive Method for Monitoring Network and Early Detection of Internet Worms.- Measures to Detect Word Substitution in Intercepted Communication.- Finding Hidden Group Structure in a Stream of Communications.- Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.- Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks.- DrillSim: A Simulation Framework for Emergency Response Drills.- A Review of Public Health Syndromic Surveillance Systems.- A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks.- Integrating IDS Alert Correlation and OS-Level Dependency Tracking.- Attacking Confidentiality: An Agent Based Approach.- Viability of Critical Mission of Grid Computing.- Suspect Vehicle Identification for Border Safety with Modified Mutual Information.- Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures.- Analyzing the Terrorist Social Networks with Visualization Tools.- Tracing the Event Evolution of Terror Attacks from On-Line News.- Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models.- On the Topology of the Dark Web of Terrorist Groups.- Indicators of Threat: Reflecting New Trends.- Practical Algorithms for Destabilizing Terrorist Networks.- Combating Terrorism Insurgency Resolution Software: A Research Note.- A First Look at Domestic and International Global Terrorism Events, 19701997.- Computational Modeling and Experimental Validation of Aviation Security Procedures.- Intelligent Face Recognition Using Feature Averaging.- Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness.- Short Papers.- Database Security Protection Via Inference Detection.- An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.- Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading.- Strategic Intelligence Analysis: From Information Processing to Meaning-Making.- A Multi-layer Naïve Bayes Model for Approximate Identity Matching.- Towards Optimal Police Patrol Routes with Genetic Algorithms.- SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment.- A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.- Detecting Deception in Person-of-Interest Statements.- Personal Information Management (PIM) for Intelligence Analysis.- Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.- Sanitization of Databases for Refined Privacy Trade-Offs.- Access Control Requirements for Preventing Insider Threats.- Venn Diagram Construction of Internet Chatroom Conversations.- Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.- Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons.- An Info-Gap Approach to Policy Selection for Bio-terror Response.- Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities.- Covering Based Granular Computing for Conflict Analysis.- Hybrid Modeling for Large-Scale Worm Propagation Simulations.- Worm Traffic Modeling for Network Performance Analysis.- Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors.- A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks A Friend Approach.- Distributing the Cost of Securing a Transportation Infrastructure.- Multi-document Summarization for Terrorism Information Extraction.- Rational Choice Deterrence and Israeli Counter-Terrorism.- Content Analysis of Jihadi Extremist Groups' Videos.- Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums.- Fast Pedestrian Detection Using Color Information.- SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home.- Extended Abstracts for Posters and Demos.- Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts.- Using Author Topic to Detect Insider Threats from Email Traffic.- Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.- On Off-Topic Web Browsing.- Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints.- Intelligence Analysis Using High Resolution Displays.- Privacy Preserving Mining of Global Association Rules on Distributed Dataset.- CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications.- KD3 Scheme for Privacy Preserving Data Mining.- Using Logic Programming to Detect Deception on the Basis of Actions.- Intelligent Information Retrieval Tools for Police.- Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction.- A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History.- Detection Using Clustering Query Results.- Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks.- Mining the Acceleration-Like Association Rules.- Analyzing Social Networks in E-Mail with Rich Syntactic Features.- E-mail Traffic Analysis Using Visualisation and Decision Trees.- Advanced Patterns and Matches in Link Analysis.- A Flexible Context-Aware Authorization Framework for Mediation Systems.- Continuous Authentication by Keystroke Dynamics Using Committee Machines.- A Flexible and Scalable Access Control for Ubiquitous Computing Environments.- A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society.- Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection.- Intelligence Use of Unstructured Data in a Data Warehouse Environment.- An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems.- Classification of Threats Via a Multi-sensor Security Portal.- Exploring the Detection Process: Integrating Judgment and Outcome Decomposition.- Issues in Merging Internet Autonomous Systems for Emergency Communications.- CWME: A Framework of Group Support System for Emergency Responses.- Abnormal Detection Algorithm Based on Match Range Model.- Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks.- A PCA-LVQ Model for Intrusion Alert Analysis.- A Formalized Taxonomy of DDoS Attacks Based on Similarity.- Practical Intrusion Detection Using Genetic-Clustering.- An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach.- Design and Implementation of FPGA Based High-Performance Intrusion Detection System.- Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis.- Detecting Anomalies in Cargo Using Graph Properties.- Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.- Email Worm Detection Using Naïve Bayes and Support Vector Machine.- An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.- A New Methodology of Analyzing Security Vulnerability for Network Services.- Using One-Time Password Based Authentication for Wireless IP Network.- Experimental Study on Wireless Sensor Network Security.- Terrorist Database: A Bangladesh Study.- Terrorist Organizations and Effects of Terrorism in Bangladesh.- Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight.- The Role of Information Superiority in the Global War on Terrorism.- A Trust-Based Security Architecture for Ubiquitous Computing Systems.- A Trust Model for Uncertain Interactions in Ubiquitous Environments.- A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles.- A Home Firewall Solution for Securing Smart Spaces.- The Security Performance Evaluation of Digital Watermarking.- A Novel Key Release Scheme from Biometrics.- Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases.


Titel: Intelligence and Security Informatics
Untertitel: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006.
EAN: 9783540344780
ISBN: 3540344780
Format: Kartonierter Einband
Herausgeber: Springer Berlin Heidelberg
Genre: Informatik
Anzahl Seiten: 800
Gewicht: 1188g
Größe: H235mm x B155mm x T42mm
Jahr: 2006
Auflage: 2006

Weitere Produkte aus der Reihe "Information Systems and Applications, incl. Internet/Web, and HCI"