Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, ProceedingsPaul Kantor Springer Science & Business Media, 2005 M05 12 - 674 pages Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH). |
Contents
Long Papers | 1 |
Information Management | 13 |
A Case Study in Network Data Mining | 14 |
Efficient Identification of Overlapping Communities | 27 |
Link Analysis Tools for Intelligence and Counterterrorism | 49 |
Private Mining of Association Rules | 72 |
Multimodal Biometrics with PKI Technologies for Border Control | 99 |
Risk Management Using Behavior Based Bayesian Networks | 115 |
Thematic Indicators Derived from World News Reports | 436 |
A Survey of Software Watermarking | 454 |
Detecting Deception in Synchronous ComputerMediated Communication | 471 |
An Ontological Approach to the Document Access Problem of Insider Threat | 486 |
Intrusion Detection System Using Sequence and Set Preserving Metric | 498 |
The Multifractal Nature of Worm and Normal Traffic at Individual | 505 |
Learning Classifiers for Misuse Detection Using a Bag of System Calls | 511 |
Infrastructure Protection and Emergency Response | 517 |
Toward a TargetSpecific Method of Threat Assessment | 139 |
Incident and Casualty Databases as a Tool for Understanding LowIntensity | 153 |
Integrating Private Databases for Data Analysis | 171 |
Deception Detection and Authorship Analysis | 183 |
Automatic Extraction of Deceptive Behavioral Cues from Video | 198 |
Automatically Determining an Anonymous Authors Native Language | 209 |
Monitoring and Surveillance | 218 |
Beyond Keyword Filtering for Message and Conversation Detection | 231 |
ContentBased Detection of Terrorists Browsing the Web Using | 244 |
Modeling and Multiway Analysis of Chatroom Tensors | 256 |
Selective Fusion for Speaker Verification in Surveillance | 269 |
Terrorism Informatics | 280 |
A Case Study of the Global Salafi Jihad | 287 |
Network | 293 |
A Conceptual Model of Counterterrorist Operations | 305 |
Researchers | 322 |
Testing a Rational Choice Model of Airline Hijackings | 340 |
Short Papers | 362 |
Leveraging OneClass SVM and Semantic Analysis to Detect Anomalous | 381 |
Some Marginal Learning Algorithms for Unsupervised Problems | 395 |
Evaluating an Infectious Disease Information Sharing and Analysis System | 412 |
How Question Answering Technology Helps to Locate Malevolent Online | 418 |
CompilerFPGA Approach to Secure Applications | 523 |
Alok Choudhary Joseph Zambreno Computational Tool in Infrastructure Emergency Total Evacuation Analysis | 530 |
Kelvin H L Wong Mingchun Luo Performance Study of a CompilerHardware Approach to Embedded Systems | 536 |
Security | 543 |
Xinjian Chen Jie Tian Qi Su Xin Yang FeiYue Wang Terrorism Informatics | 549 |
Indicators and Proven Analytic Techniques | 561 |
Conventional to CBRN | 567 |
The Application of PROACT RCA to TerrorismCounter Terrorism | 579 |
Extended Abstracts for Posters and Demos | 590 |
An Empirical Study on Dynamic Effects on Deception Detection | 597 |
Detecting Misuse of Information Retrieval Systems Using Data Mining | 604 |
Principal Component Analysis PCA for Data Fusion and Navigation | 610 |
Revolutionizing the Way We Collect Analyze and Share | 614 |
Information Security and Intrusion Detection | 627 |
Dynamic Security Service Negotiation to Ensure Security for Information | 640 |
On the QP Algorithm in Software Watermarking | 646 |
Infrastructure Protection and Emergency Response | 652 |
Surveillance Border Protection and Transportation Systems | 658 |
Application of Cooperative Coevolution in Pedestrian Detection Systems | 664 |
671 | |
Other editions - View all
Common terms and phrases
activities alert algorithm analysis applied approach association attack attributes behavior called cause clusters collection communication Computer connections consider contains data mining database dataset deception decision detection determine developed documents domain effective emergency entity event example experiments extraction Figure function given graph groups hijacking identify important incident increase indicators individual instances intelligence interest International knowledge means measures messages method nodes normal objects operations organizations original parameters parties patterns performance phase possible potential present problem Proceedings proposed queue References relationships relevant represent requirements resource response risk Science selected shows similar social specific statistical step structure success Table task techniques Technology terrorism terrorist types University values vector virus watermark