default search action
4th ISI 2006: San Diego, CA, USA
- Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang:
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings. Lecture Notes in Computer Science 3975, Springer 2006, ISBN 3-540-34478-0
Part I: Long Papers
Intelligence Analysis and Knowledge Discovery
- Douglas Yeung, John D. Lowrance:
Computer-Mediated Collaborative Reasoning and Intelligence Analysis. 1-13 - Byron Marshall, Hsinchun Chen:
Using Importance Flooding to Identify Interesting Networks of Criminal Activity. 14-25 - Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart, Tamara Oellinger, Camelia Ignat:
Towards Automatic Event Tracking. 26-34 - Yiming Ma, Dawit Yimam Seid:
Interactive Refinement of Filtering Queries on Streaming Intelligence Data. 35-47 - Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza:
Semantic Analytics Visualization. 48-59 - Ahmed Abbasi, Hsinchun Chen:
Visualizing Authorship for Identification. 60-71 - Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ronald Eaglin:
A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases. 72-82 - Aram Galstyan, Paul R. Cohen:
Iterative Relational Classification Through Three-State Epidemic Dynamics. 83-92 - David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers:
Analyzing Entities and Topics in News Articles Using Statistical Topic Models. 93-104 - Clayton T. Morrison, Paul R. Cohen:
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment. 105-116
Access Control, Privacy, and Cyber Trust
- Young-Woo Seo, Katia P. Sycara:
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders. 117-128 - Hyang-Chang Choi, Seungyong Lee, HyungHyo Lee:
Design and Implementation of a Policy-Based Privacy Authorization System. 129-140 - Artak Amirbekyan, Vladimir Estivill-Castro:
Privacy Preserving DBSCAN for Vertically Partitioned Data. 141-153 - Jianming He, Wesley W. Chu, Zhenyu Liu:
Inferring Privacy Information from Social Networks. 154-165
Surveillance and Emergency Response
- Xiaolei Li, Jiawei Han, Sangkyum Kim:
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects. 166-177 - Chen Bo, Binxing Fang, Xiao-chun Yun:
Adaptive Method for Monitoring Network and Early Detection of Internet Worms. 178-189 - SzeWang Fong, David B. Skillicorn, Dmitri Roussinov:
Measures to Detect Word Substitution in Intercepted Communication. 190-200 - Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, William A. Wallace, Mohammed Javeed Zaki:
Finding Hidden Group Structure in a Stream of Communications. 201-212 - Evrim Acar, Seyit Ahmet Çamtepe, Bülent Yener:
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. 213-224 - Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner:
Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks. 225-236 - Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian:
DrillSim: A Simulation Framework for Emergency Response Drills. 237-248 - Ping Yan, Daniel Dajun Zeng, Hsinchun Chen:
A Review of Public Health Syndromic Surveillance Systems. 249-260
Infrastructure Protection and Cyber Security
- Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao:
A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. 261-271 - Yan Zhai, Peng Ning, Jun Xu:
Integrating IDS Alert Correlation and OS-Level Dependency Tracking. 272-284 - Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi:
Attacking Confidentiality: An Agent Based Approach. 285-296 - Fangfang Liu, Yan Chi, Yuliang Shi:
Viability of Critical Mission of Grid Computing. 297-307 - Siddharth Kaza, Yuan Wang, Hsinchun Chen:
Suspect Vehicle Identification for Border Safety with Modified Mutual Information. 308-318 - Saket Anand, David Madigan, Richard J. Mammone, Saumitr Pathak, Fred S. Roberts:
Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures. 319-330
Terrorism Informatics and Countermeasures
- Christopher C. Yang, Nan Liu, Marc Sageman:
Analyzing the Terrorist Social Networks with Visualization Tools. 331-342 - Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei:
Tracing the Event Evolution of Terror Attacks from On-Line News. 343-354 - Robert G. Ross:
Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models. 355-366 - Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin:
On the Topology of the Dark Web of Terrorist Groups. 367-376 - Yael Shahar:
Indicators of Threat: Reflecting New Trends. 377-388 - Nasrullah Memon, Henrik Legind Larsen:
Practical Algorithms for Destabilizing Terrorist Networks. 389-400 - Joshua Sinai:
Combating Terrorism Insurgency Resolution Software: A Research Note. 401-406 - Laura Dugan, Gary LaFree, Heather Fogg:
A First Look at Domestic and International Global Terrorism Events, 1970-1997. 407-419
Emerging Applications
- Uwe Glässer, Sarah Rastkar, Mona Vajihollahi:
Computational Modeling and Experimental Validation of Aviation Security Procedures. 420-431 - Adnan Khashman, Akram A. Garad:
Intelligent Face Recognition Using Feature Averaging. 432-439 - Sangho Park, Mohan M. Trivedi:
Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness. 440-451
Part II: Short Papers
Data Analysis, Knowledge Discovery, and Information Dissemination
- Yu Chen, Wesley W. Chu:
Database Security Protection Via Inference Detection. 452-458 - Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano:
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics. 459-465 - Eric A. Bier, Edward W. Ishak, Ed Huai-hsin Chi:
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading. 466-472 - Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Viner:
Strategic Intelligence Analysis: From Information Processing to Meaning-Making. 473-478 - G. Alan Wang, Hsinchun Chen, Homa Atabakhsh:
A Multi-layer Naïve Bayes Model for Approximate Identity Matching. 479-484 - Danilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado:
Towards Optimal Police Patrol Routes with Genetic Algorithms. 485-491 - Amit Mathew, Amit P. Sheth, Leonidas Deligiannidis:
SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment. 492-497 - Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen:
A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan. 498-503 - Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon:
Detecting Deception in Person-of-Interest Statements. 504-509 - Antonio Badia:
Personal Information Management (PIM) for Intelligence Analysis. 510-515 - Ragib Hasan, Marianne Winslett:
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. 516-521
Access Control, Privacy, and Cyber Trust
- Ahmed HajYasien, Vladimir Estivill-Castro, Rodney W. Topor:
Sanitization of Databases for Refined Privacy Trade-Offs. 522-528 - Joon S. Park, Joseph Giordano:
Access Control Requirements for Preventing Insider Threats. 529-534
Surveillance, Bioterrorism, and Emergency Response
- James F. McCarthy, Mukkai S. Krishnamoorthy:
Venn Diagram Construction of Internet Chatroom Conversations. 535-541 - Jian Ma, Daniel Dajun Zeng, Hsinchun Chen:
Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics. 542-547 - Xiaohua Hu, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm:
Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. 548-553 - Anna Yoffe, Yakov Ben-Haim:
An Info-Gap Approach to Policy Selection for Bio-terror Response. 554-559 - David A. Bray, Benn R. Konsynski:
Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities. 560-565 - William Zhu, Fei-Yue Wang:
Covering Based Granular Computing for Conflict Analysis. 566-571
Infrastructure Protection and Cyber Security
- Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations. 572-577 - Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao:
Worm Traffic Modeling for Network Performance Analysis. 578-583 - Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao:
Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors. 584-589 - Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. 590-595 - Sudarshan S. Chawathe:
Distributing the Cost of Securing a Transportation Infrastructure. 596-601
Terrorism Informatics
- Fu Lee Wang, Christopher C. Yang, Xiaodong Shi:
Multi-document Summarization for Terrorism Information Extraction. 602-608 - Don Radlauer:
Rational Choice Deterrence and Israeli Counter-Terrorism. 609-614 - Arab Salem, Edna Reid, Hsinchun Chen:
Content Analysis of Jihadi Extremist Groups' Videos. 615-620 - Yilu Zhou, Jialun Qin, Guanpi Lai, Edna Reid, Hsinchun Chen:
Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums. 621-626
Emerging Applications
- Yanwu Xu, Xianbin Cao, Hong Qiao, Fei-Yue Wang:
Fast Pedestrian Detection Using Color Information. 627-632 - Je-Goon Ryu, Se-Kee Kil, Hyeon-Min Shim, Sang-Moo Lee, Eung-Hyuk Lee, Seung-Hong Hong:
SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home. 633-638
Part III: Extended Abstracts for Posters and Demos
Data Analysis and Knowledge Discovery
- Samar Mouti, Fadel Sukkar:
Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts. 639-641 - James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using Author Topic to Detect Insider Threats from Email Traffic. 642-643 - Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. 644-646 - Nazli Goharian, Alana Platt, Ophir Frieder:
On Off-Topic Web Browsing. 647-649 - Unil Yun, John J. Leggett, TeongJoo Ong:
Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints. 650-651 - Timothy Buennemeyer, John Booker, Andrew J. Sabri, Chris North:
Intelligence Analysis Using High Resolution Displays. 652-653 - Huizhang Shen, Jidi Zhao, Ruipu Yao:
Privacy Preserving Mining of Global Association Rules on Distributed Dataset. 654-656 - Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han:
CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications. 657-658 - Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang:
KD3 Scheme for Privacy Preserving Data Mining. 659-661 - James D. Jones:
Using Logic Programming to Detect Deception on the Basis of Actions. 662-663 - Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens:
Intelligent Information Retrieval Tools for Police. 664-665 - Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens:
Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction. 666-667 - James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson:
A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History. 668-670 - Nazli Goharian, Alana Platt:
Detection Using Clustering Query Results. 671-673 - Roger B. Bradford:
Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks. 674-675 - Dechang Pi, Xiaolin Qin, Wangfeng Gu:
Mining the Acceleration-Like Association Rules. 676-677 - Paul Thompson, Wei Zhang:
Analyzing Social Networks in E-Mail with Rich Syntactic Features. 678-679 - Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett:
E-mail Traffic Analysis Using Visualisation and Decision Trees. 680-681 - Michael Wolverton, Ian W. Harrison, John D. Lowrance, Andres C. Rodriguez, Jérôme Thoméré:
Advanced Patterns and Matches in Link Analysis. 682-683
Data, Information, and Knowledge Management
- Li Yang, Joseph M. Kizza, Raimund K. Ege:
A Flexible Context-Aware Authorization Framework for Mediation Systems. 684-685 - Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg:
Continuous Authentication by Keystroke Dynamics Using Committee Machines. 686-687 - Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Flexible and Scalable Access Control for Ubiquitous Computing Environments. 688-689 - Dalei Guo, Shuming Tang:
A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society. 690-691 - Terrance Goan, Emi Fujioka, Ryan Kaneshiro, Lynn Gasch:
Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection. 692-693 - Jim Wakefield:
Intelligence Use of Unstructured Data in a Data Warehouse Environment. 694-695
Threat Detection, Surveillance, and Emergency Response
- Cyril Onwubiko, Andrew P. Lenaghan:
An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. 696-698 - Amar Singh, Lawrence B. Holder:
Classification of Threats Via a Multi-sensor Security Portal. 699-700 - Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad:
Exploring the Detection Process: Integrating Judgment and Outcome Decomposition. 701-703 - Selwyn Russell:
Issues in Merging Internet Autonomous Systems for Emergency Communications. 704-705 - Yaodong Li, Huiguang He, Baihua Xiao, Chunheng Wang, Feiyue Wang:
CWME: A Framework of Group Support System for Emergency Responses. 706-707
Infrastructure Protection and Cyber Security
- Jungan Chen:
Abnormal Detection Algorithm Based on Match Range Model. 708-710 - Emmanuel Hooper:
Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. 711-714 - Jing-Xin Wang, Zhiying Wang, Kui Dai:
A PCA-LVQ Model for Intrusion Alert Analysis. 715-716 - Jian Kang, Yuan Zhang, Jiu-bin Ju:
A Formalized Taxonomy of DDoS Attacks Based on Similarity. 717-719 - Chien-Chuan Lin, Ming-Shi Wang:
Practical Intrusion Detection Using Genetic-Clustering. 720-721 - Shao-Shin Hung, Damon Shing-Min Liu:
An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach. 722-723 - Byoung-Koo Kim, Young-Jun Heo, Jintae Oh:
Design and Implementation of FPGA Based High-Performance Intrusion Detection System. 724-725 - Hyun Joo Kim, Jung-Chan Na, Jong-Soo Jang:
Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis. 726-727 - William Eberle, Lawrence B. Holder:
Detecting Anomalies in Cargo Using Graph Properties. 728-730 - Yongsu Park, Yong Ho Song, Eul-Gyu Im:
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. 731-732 - Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer:
Email Worm Detection Using Naïve Bayes and Support Vector Machine. 733-734 - Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee:
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. 735-736 - Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im:
A New Methodology of Analyzing Security Vulnerability for Network Services. 737-738 - Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han:
Using One-Time Password Based Authentication for Wireless IP Network. 739-740 - Taekyoung Kwon, Sang-ho Park:
Experimental Study on Wireless Sensor Network Security. 741-743
Terrorism Informatics
- Abu Md. Zafor Alam, Sajjad Waheed:
Terrorist Database: A Bangladesh Study. 744-745 - Abu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan:
Terrorist Organizations and Effects of Terrorism in Bangladesh. 746-747 - Martine Naillon, Jean-François di Chiara, Bruno Eude, Christian Amathieux:
Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight. 748-749 - Annette Sobel:
The Role of Information Superiority in the Global War on Terrorism. 750-752
Emerging Applications
- Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:
A Trust-Based Security Architecture for Ubiquitous Computing Systems. 753-754 - Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee:
A Trust Model for Uncertain Interactions in Ubiquitous Environments. 755-757 - D. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang:
A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles. 758-759 - Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Home Firewall Solution for Securing Smart Spaces. 760-761 - Xinhong Zhang, Shejiao Li, Fan Zhang:
The Security Performance Evaluation of Digital Watermarking. 762-763 - Thian Song Ong, Andrew Teoh Beng Jin, David Ngo Chek Ling:
A Novel Key Release Scheme from Biometrics. 764-765 - Olcay Kursun, Kenneth M. Reynolds, Oleg V. Favorov:
Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases. 766-767
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.