skip to content
Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006 : proceedings Preview this item
ClosePreview this item

Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006 : proceedings

Author: Sharad Mehrotra
Publisher: Berlin ; New York : Springer, ©2006.
Series: Lecture notes in computer science, 3975.
Edition/Format:   Book   Microform : Document : Conference publication : Microfilm   Computer File : EnglishView all editions and formats

This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Conference papers and proceedings
Material Type: Conference publication, Document, Internet resource
Document Type: Book, Computer File, Internet Resource
All Authors / Contributors: Sharad Mehrotra
ISBN: 3540344780 9783540344780
OCLC Number: 70866749
Description: xxii, 772 pages : illustrations ; 24 cm.
Contents: Long Papers.- Computer-Mediated Collaborative Reasoning and Intelligence Analysis.- Using Importance Flooding to Identify Interesting Networks of Criminal Activity.- Towards Automatic Event Tracking.- Interactive Refinement of Filtering Queries on Streaming Intelligence Data.- Semantic Analytics Visualization.- Visualizing Authorship for Identification.- A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases.- Iterative Relational Classification Through Three-State Epidemic Dynamics.- Analyzing Entities and Topics in News Articles Using Statistical Topic Models.- The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment.- Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders.- Design and Implementation of a Policy-Based Privacy Authorization System.- Privacy Preserving DBSCAN for Vertically Partitioned Data.- Inferring Privacy Information from Social Networks.- Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects.- Adaptive Method for Monitoring Network and Early Detection of Internet Worms.- Measures to Detect Word Substitution in Intercepted Communication.- Finding Hidden Group Structure in a Stream of Communications.- Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.- Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks.- DrillSim: A Simulation Framework for Emergency Response Drills.- A Review of Public Health Syndromic Surveillance Systems.- A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks.- Integrating IDS Alert Correlation and OS-Level Dependency Tracking.- Attacking Confidentiality: An Agent Based Approach.- Viability of Critical Mission of Grid Computing.- Suspect Vehicle Identification for Border Safety with Modified Mutual Information.- Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures.- Analyzing the Terrorist Social Networks with Visualization Tools.- Tracing the Event Evolution of Terror Attacks from On-Line News.- Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models.- On the Topology of the Dark Web of Terrorist Groups.- Indicators of Threat: Reflecting New Trends.- Practical Algorithms for Destabilizing Terrorist Networks.- Combating Terrorism Insurgency Resolution Software: A Research Note.- A First Look at Domestic and International Global Terrorism Events, 1970-1997.- Computational Modeling and Experimental Validation of Aviation Security Procedures.- Intelligent Face Recognition Using Feature Averaging.- Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness.- Short Papers.- Database Security Protection Via Inference Detection.- An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.- Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading.- Strategic Intelligence Analysis: From Information Processing to Meaning-Making.- A Multi-layer Naive Bayes Model for Approximate Identity Matching.- Towards Optimal Police Patrol Routes with Genetic Algorithms.- SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment.- A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.- Detecting Deception in Person-of-Interest Statements.- Personal Information Management (PIM) for Intelligence Analysis.- Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.- Sanitization of Databases for Refined Privacy Trade-Offs.- Access Control Requirements for Preventing Insider Threats.- Venn Diagram Construction of Internet Chatroom Conversations.- Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.- Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons.- An Info-Gap Approach to Policy Selection for Bio-terror Response.- Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities.- Covering Based Granular Computing for Conflict Analysis.- Hybrid Modeling for Large-Scale Worm Propagation Simulations.- Worm Traffic Modeling for Network Performance Analysis.- Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors.- A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.- Distributing the Cost of Securing a Transportation Infrastructure.- Multi-document Summarization for Terrorism Information Extraction.- Rational Choice Deterrence and Israeli Counter-Terrorism.- Content Analysis of Jihadi Extremist Groups' Videos.- Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums.- Fast Pedestrian Detection Using Color Information.- SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home.- Extended Abstracts for Posters and Demos.- Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts.- Using Author Topic to Detect Insider Threats from Email Traffic.- Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.- On Off-Topic Web Browsing.- Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints.- Intelligence Analysis Using High Resolution Displays.- Privacy Preserving Mining of Global Association Rules on Distributed Dataset.- CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications.- KD3 Scheme for Privacy Preserving Data Mining.- Using Logic Programming to Detect Deception on the Basis of Actions.- Intelligent Information Retrieval Tools for Police.- Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction.- A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History.- Detection Using Clustering Query Results.- Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks.- Mining the Acceleration-Like Association Rules.- Analyzing Social Networks in E-Mail with Rich Syntactic Features.- E-mail Traffic Analysis Using Visualisation and Decision Trees.- Advanced Patterns and Matches in Link Analysis.- A Flexible Context-Aware Authorization Framework for Mediation Systems.- Continuous Authentication by Keystroke Dynamics Using Committee Machines.- A Flexible and Scalable Access Control for Ubiquitous Computing Environments.- A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society.- Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection.- Intelligence Use of Unstructured Data in a Data Warehouse Environment.- An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems.- Classification of Threats Via a Multi-sensor Security Portal.- Exploring the Detection Process: Integrating Judgment and Outcome Decomposition.- Issues in Merging Internet Autonomous Systems for Emergency Communications.- CWME: A Framework of Group Support System for Emergency Responses.- Abnormal Detection Algorithm Based on Match Range Model.- Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks.- A PCA-LVQ Model for Intrusion Alert Analysis.- A Formalized Taxonomy of DDoS Attacks Based on Similarity.- Practical Intrusion Detection Using Genetic-Clustering.- An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach.- Design and Implementation of FPGA Based High-Performance Intrusion Detection System.- Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis.- Detecting Anomalies in Cargo Using Graph Properties.- Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.- Email Worm Detection Using Naive Bayes and Support Vector Machine.- An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.- A New Methodology of Analyzing Security Vulnerability for Network Services.- Using One-Time Password Based Authentication for Wireless IP Network.- Experimental Study on Wireless Sensor Network Security.- Terrorist Database: A Bangladesh Study.- Terrorist Organizations and Effects of Terrorism in Bangladesh.- Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight.- The Role of Information Superiority in the Global War on Terrorism.- A Trust-Based Security Architecture for Ubiquitous Computing Systems.- A Trust Model for Uncertain Interactions in Ubiquitous Environments.- A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles.- A Home Firewall Solution for Securing Smart Spaces.- The Security Performance Evaluation of Digital Watermarking.- A Novel Key Release Scheme from Biometrics.- Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases.
Series Title: Lecture notes in computer science, 3975.
Other Titles: IEEE International Conference on Intelligence and Security Informatics
ISI 2006
Responsibility: Sharad Mehrotra [and others] (eds.).


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006 : proceedings
    a bgn:Microform, schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "70866749" ;
    library:placeOfPublication <> ; # Berlin
    library:placeOfPublication <> ;
    library:placeOfPublication <> ; # New York
    schema:about <> ; # National security
    schema:about <> ; # Terrorism--Data processing
    schema:about <> ; # Computer security
    schema:about <> ; # Data mining
    schema:about <> ;
    schema:about <> ; # Data mining
    schema:about <> ; # National security
    schema:about <> ; # Expert systems (Computer science)
    schema:about <> ; # Computer security
    schema:alternateName "IEEE International Conference on Intelligence and Security Informatics" ;
    schema:alternateName "ISI 2006" ;
    schema:contributor <> ; # Sharad Mehrotra
    schema:copyrightYear "2006" ;
    schema:creator <> ; # IEEE International Conference on Intelligence and Security Informatics (2006 : San Diego, Calif.)
    schema:datePublished "2006" ;
    schema:exampleOfWork <> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <> ; # Lecture notes in computer science ;
    schema:name "Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006 : proceedings"@en ;
    schema:productID "70866749" ;
    schema:publication <> ;
    schema:publisher <> ; # Springer
    schema:url <> ;
    schema:workExample <> ;
    wdrs:describedby <> ;

Related Entities

<> # New York
    a schema:Place ;
    schema:name "New York" ;

<> # IEEE International Conference on Intelligence and Security Informatics (2006 : San Diego, Calif.)
    a bgn:Meeting, schema:Event ;
    schema:location <> ; # San Diego, Calif.)
    schema:name "IEEE International Conference on Intelligence and Security Informatics (2006 : San Diego, Calif.)" ;

<> # San Diego, Calif.)
    a schema:Place ;
    schema:name "San Diego, Calif.)" ;

<> # National security
    a schema:Intangible ;
    schema:name "National security"@en ;

<> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;

<> # Data mining
    a schema:Intangible ;
    schema:name "Data mining"@en ;

<> # Expert systems (Computer science)
    a schema:Intangible ;
    schema:name "Expert systems (Computer science)"@en ;

<> # Sharad Mehrotra
    a schema:Person ;
    schema:birthDate "1968" ;
    schema:familyName "Mehrotra" ;
    schema:givenName "Sharad" ;
    schema:name "Sharad Mehrotra" ;

    a schema:ProductModel ;
    schema:isbn "3540344780" ;
    schema:isbn "9783540344780" ;

<> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <> ; # Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006 : proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;

    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <> ; # Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006 : proceedings
    schema:dateModified "2018-08-02" ;
    void:inDataset <> ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.