Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 3073

ISBN: 3540221255, 9783540221258, 9783540259527

Size: 14 MB (14385523 bytes)

Pages: 544/561

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman (auth.), Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt (eds.)3540221255, 9783540221258, 9783540259527

This book constitutes the refereed proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, held in Tucson, AZ, USA in June 2004.

The 29 revised full papers and 12 revised short papers presented together with 6 extended abstracts of posters and 3 panel discussion summaries were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on bioterrorism and disease informatics; data access, privacy, and trust management; data management and mining; deception detection; information assurance and infrastructure protection; monitoring and surveillance; security policies and evaluation; and social network analysis.


Table of contents :
Front Matter….Pages –
Computer-Based Training for Deception Detection: What Users Want?….Pages 163-175
Identifying Multi-ID Users in Open Forums….Pages 176-186
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training….Pages 187-200
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats….Pages 201-213
Critical Infrastructure Integration Modeling and Simulation….Pages 214-225
Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection….Pages 226-238
The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks….Pages 239-251
A Tool for Internet Chatroom Surveillance….Pages 252-265
ChatTrack: Chat Room Topic Detection Using Classification….Pages 266-277
Aligning Simulation Models of Smallpox Outbreaks….Pages 1-16
Data Analytics for Bioterrorism Surveillance….Pages 17-27
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics….Pages 28-41
A Novel Policy and Information Flow Security Model for Active Network….Pages 42-55
A Novel Autonomous Trust Management Model for Mobile Agents….Pages 56-65
Privacy-Preserving Inter-database Operations….Pages 66-82
Finding Unusual Correlation Using Matrix Decompositions….Pages 83-99
Generating Concept Hierarchies from Text for Intelligence Analysis….Pages 100-113
Interactive Query Languages for Intelligence Tasks….Pages 114-124
Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism….Pages 125-145
The Architecture of the Cornell Knowledge Broker….Pages 146-162
SECRETS : A Secure Real-Time Multimedia Surveillance System….Pages 278-296
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information….Pages 297-306
THEMIS: Threat Evaluation Metamodel for Information Systems….Pages 307-321
Balancing Security and Privacy in the 21 st Century….Pages 322-330
IT Security Risk Management under Network Effects and Layered Protection Strategy….Pages 331-348
Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations….Pages 349-358
Analyzing and Visualizing Criminal Network Dynamics: A Case Study….Pages 359-377
Discovering Hidden Groups in Communication Networks….Pages 378-389
Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data….Pages 390-402
Using Speech Act Profiling for Deception Detection….Pages 403-410
Testing Various Modes of Computer-Based Training for Deception Detection….Pages 411-417
The Use of Data Mining Techniques in Operational Crime Fighting….Pages 418-425
Spatial Forecast Methods for Terrorist Events in Urban Environments….Pages 426-435
Web-Based Intelligence Notification System: Architecture and Design….Pages 436-448
Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network….Pages 449-456
Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data….Pages 457-466
Information Sharing and Collaboration Policies within Government Agencies….Pages 467-475
Intrusion-Tolerant Intrusion Detection System….Pages 476-483
Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy….Pages 484-491
Semantic Analysis for Monitoring Insider Threats….Pages 492-500
Towards a Social Network Approach for Monitoring Insider Threats to Information Security….Pages 501-507
Policy-Based Information Sharing with Semantics….Pages 508-509
Determining the Gender of the Unseen Name through Hyphenation….Pages 510-511
A Framework for a Secure Federated Patient Healthcare System….Pages 512-513
Vulnerability Analysis and Evaluation within an Intranet….Pages 514-515
Security Informatics: A Paradigm Shift in Information Technology Education….Pages 516-517
Research of Characteristics of Worm Traffic….Pages 518-519
MIPT: Sharing Terrorism Information Resources….Pages 520-525
Post-9/11 Evolution of Al Qaeda….Pages 526-530
Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism….Pages 531-533
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings”
Shopping Cart
Scroll to Top