Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings

Front Cover
Paul Kantor
Springer Science & Business Media, 2005 M05 12 - 674 pages
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).

From inside the book

Contents

Long Papers
1
Information Management
13
A Case Study in Network Data Mining
14
Efficient Identification of Overlapping Communities
27
Link Analysis Tools for Intelligence and Counterterrorism
49
Private Mining of Association Rules
72
Multimodal Biometrics with PKI Technologies for Border Control
99
Risk Management Using Behavior Based Bayesian Networks
115
Thematic Indicators Derived from World News Reports
436
A Survey of Software Watermarking
454
Detecting Deception in Synchronous ComputerMediated Communication
471
An Ontological Approach to the Document Access Problem of Insider Threat
486
Intrusion Detection System Using Sequence and Set Preserving Metric
498
The Multifractal Nature of Worm and Normal Traffic at Individual
505
Learning Classifiers for Misuse Detection Using a Bag of System Calls
511
Infrastructure Protection and Emergency Response
517

Toward a TargetSpecific Method of Threat Assessment
139
Incident and Casualty Databases as a Tool for Understanding LowIntensity
153
Integrating Private Databases for Data Analysis
171
Deception Detection and Authorship Analysis
183
Automatic Extraction of Deceptive Behavioral Cues from Video
198
Automatically Determining an Anonymous Authors Native Language
209
Monitoring and Surveillance
218
Beyond Keyword Filtering for Message and Conversation Detection
231
ContentBased Detection of Terrorists Browsing the Web Using
244
Modeling and Multiway Analysis of Chatroom Tensors
256
Selective Fusion for Speaker Verification in Surveillance
269
Terrorism Informatics
280
A Case Study of the Global Salafi Jihad
287
Network
293
A Conceptual Model of Counterterrorist Operations
305
Researchers
322
Testing a Rational Choice Model of Airline Hijackings
340
Short Papers
362
Leveraging OneClass SVM and Semantic Analysis to Detect Anomalous
381
Some Marginal Learning Algorithms for Unsupervised Problems
395
Evaluating an Infectious Disease Information Sharing and Analysis System
412
How Question Answering Technology Helps to Locate Malevolent Online
418
CompilerFPGA Approach to Secure Applications
523
Alok Choudhary Joseph Zambreno Computational Tool in Infrastructure Emergency Total Evacuation Analysis
530
Kelvin H L Wong Mingchun Luo Performance Study of a CompilerHardware Approach to Embedded Systems
536
Security
543
Xinjian Chen Jie Tian Qi Su Xin Yang FeiYue Wang Terrorism Informatics
549
Indicators and Proven Analytic Techniques
561
Conventional to CBRN
567
The Application of PROACT RCA to TerrorismCounter Terrorism
579
Extended Abstracts for Posters and Demos
590
An Empirical Study on Dynamic Effects on Deception Detection
597
Detecting Misuse of Information Retrieval Systems Using Data Mining
604
Principal Component Analysis PCA for Data Fusion and Navigation
610
Revolutionizing the Way We Collect Analyze and Share
614
Information Security and Intrusion Detection
627
Dynamic Security Service Negotiation to Ensure Security for Information
640
On the QP Algorithm in Software Watermarking
646
Infrastructure Protection and Emergency Response
652
Surveillance Border Protection and Transportation Systems
658
Application of Cooperative Coevolution in Pedestrian Detection Systems
664
Author Index
671
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information