![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
1st ISI 2003: Tucson, AZ, USA
- Hsinchun Chen, Richard Miranda, Daniel Dajun Zeng, Chris C. Demchak, Jennifer Schroeder, Therani Madhusudan:
Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings. Lecture Notes in Computer Science 2665, Springer 2003, ISBN 3-540-40189-X
Part I: Full Papers
Data Management and Mining
- Aixin Sun
, Myo-Myo Naing, Ee-Peng Lim
, Wai Lam:
Using Support Vector Machines for Terrorism Information Extraction. 1-12 - Song Lin, Donald E. Brown:
Criminal Incident Data Association Using the OLAP Technology. 13-26 - Frankie Patman, Paul Thompson:
Names: A New Frontier in Text Mining. 27-38 - Alexander Dolotov, Mary Strickler:
Web-Based Intelligence Reports System. 39-58 - Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen:
Authorship Analysis in Cybercrime Investigation. 59-73
Deception Detection
- Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
Behavior Profiling of Email. 74-90 - Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr.:
Detecting Deception through Linguistic Analysis. 91-101 - Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell:
A Longitudinal Analysis of Language Behavior of Deception in E-mail. 102-110
Analytical Techniques
- Qingsong Lu, Yan Huang
, Shashi Shekhar:
Evacuation Planning: A Capacity Constrained Routing Approach. 111-125 - Malik Magdon-Ismail, Mark K. Goldberg, William A. Wallace, David Siebecker:
Locating Hidden Groups in Communication Networks Using Hidden Markov Models. 126-137 - Kar Wing Li, Christopher C. Yang:
Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department. 138-152 - Yifei Xue, Donald E. Brown:
Decision Based Spatial Analysis of Crime. 153-167
Visualization
- Jennifer Schroeder, Jennifer Jie Xu, Hsinchun Chen:
CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis. 168-180 - Ty Buetow, Luis G. Chaboya, Christopher D. O'Toole, Tom Cushna, Damien Daspit, Tim Petersen, Homa Atabakhsh, Hsinchun Chen:
A Spatio Temporal Visualizer for Law Enforcement. 181-194 - Sudarshan S. Chawathe:
Tracking Hidden Groups Using Communications. 195-208
Knowledge Management and Adoption
- Paul Jen-Hwa Hu, Chienting Lin, Hsinchun Chen:
Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study. 209-222 - Chris C. Demchak:
"Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age. 223-231 - Jennifer Jie Xu, Hsinchun Chen:
Untangling Criminal Networks: A Case Study. 232-248
Collaborative Systems and Methodologies
- T. S. Raghu, Ram Ramesh, Andrew B. Whinston:
Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework. 249-265 - J. Leon Zhao, Henry H. Bi
, Hsinchun Chen:
Collaborative Workflow Management for Interagency Crime Analysis. 266-280 - Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau
, Chienting Lin:
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement. 281-295
Monitoring and Surveillance
- Antonio Badia:
Active Database Systems for Monitoring and Surveillance. 296-307 - William T. Scherer, Leah L. Spradley, Marc H. Evans:
Integrated "Mixed" Networks Security Monitoring - A Proposed Framework. 308-321 - Donald J. Berndt, Alan R. Hevner, James Studnicki:
Bioterrorism Surveillance with Real-Time Data Warehousing. 322-335
Part II: Short Papers
Data Management and Mining
- Hillol Kargupta, Kun Liu, Jessica Ryan:
Privacy Sensitive Distributed Data Mining from Multi-party Data. 336-342 - Pablo Ariel Duboue, Kathleen R. McKeown, Vasileios Hatzivassiloglou:
PROGENIE: Biographical Descriptions for Intelligence Analysis. 343-345 - Joachim Hammer, William J. O'Brien, Mark S. Schmalz:
Scalable Knowledge Extraction from Legacy Sources with SEEK. 346-349 - Sachin S. Kajarekar, M. Kemal Sönmez, Luciana Ferrer, Venkata Ramana Rao Gadde, Anand Venkataraman, Elizabeth Shriberg, Andreas Stolcke, Harry Bratt:
"TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features. 350-354 - D. V. Sreenath, William I. Grosky, Farshad Fotouhi:
Emergent Semantics from Users' Browsing Paths. 355-357
Deception Detection
- Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. 358-365 - Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Training Professionals to Detect Deception. 366-370 - Bogju Lee, Youna Park:
An E-mail Monitoring System for Detecting Outflow of Confidential Documents. 371-374
Methodologies and Applications
- Lihui Lin, Xianjun Geng, Andrew B. Whinston:
Intelligence and Security Informatics: An Information Economics Perspective. 375-378 - Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou:
An International Perspective on Fighting Cybercrime. 379-384
Part III: Extended Abstracts for Posters
Data Management and Mining
- Ping Lin, K. Selçuk Candan:
Hiding Traversal of Tree Structured Data from Untrusted Data Stores. 385 - Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng:
Criminal Record Matching Based on the Vector Space Model. 386 - Mathew Neville Smith, Peter J. H. King:
Database Support for Exploring Criminal Networks. 387 - Ping Lin, K. Selçuk Candan, Rida A. Bazzi, Zhichao Liu:
Hiding Data and Code Security for Application Hosting Infrastructure. 388
Security Informatics
- Gregory B. Newby, Kevin Gamiel:
Secure Information Sharing and Information Retrieval Infrastructure with GridIR. 389 - Paul Thompson:
Semantic Hacking and Intelligence and Security Informatics (Extended Abstract). 390
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.