


default search action
4th ISI 2006: San Diego, CA, USA
- Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang:

Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings. Lecture Notes in Computer Science 3975, Springer 2006, ISBN 3-540-34478-0
Part I: Long Papers
Intelligence Analysis and Knowledge Discovery
- Douglas Yeung, John D. Lowrance:

Computer-Mediated Collaborative Reasoning and Intelligence Analysis. 1-13 - Byron Marshall, Hsinchun Chen:

Using Importance Flooding to Identify Interesting Networks of Criminal Activity. 14-25 - Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart, Tamara Oellinger, Camelia Ignat:

Towards Automatic Event Tracking. 26-34 - Yiming Ma, Dawit Yimam Seid:

Interactive Refinement of Filtering Queries on Streaming Intelligence Data. 35-47 - Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza:

Semantic Analytics Visualization. 48-59 - Ahmed Abbasi

, Hsinchun Chen:
Visualizing Authorship for Identification. 60-71 - Olcay Kursun

, Anna Koufakou
, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ronald Eaglin:
A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases. 72-82 - Aram Galstyan, Paul R. Cohen:

Iterative Relational Classification Through Three-State Epidemic Dynamics. 83-92 - David Newman, Chaitanya Chemudugunta, Padhraic Smyth

, Mark Steyvers
:
Analyzing Entities and Topics in News Articles Using Statistical Topic Models. 93-104 - Clayton T. Morrison, Paul R. Cohen:

The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment. 105-116
Access Control, Privacy, and Cyber Trust
- Young-Woo Seo, Katia P. Sycara:

Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders. 117-128 - Hyang-Chang Choi, Seungyong Lee, HyungHyo Lee:

Design and Implementation of a Policy-Based Privacy Authorization System. 129-140 - Artak Amirbekyan, Vladimir Estivill-Castro

:
Privacy Preserving DBSCAN for Vertically Partitioned Data. 141-153 - Jianming He, Wesley W. Chu, Zhenyu Liu:

Inferring Privacy Information from Social Networks. 154-165
Surveillance and Emergency Response
- Xiaolei Li, Jiawei Han, Sangkyum Kim:

Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects. 166-177 - Chen Bo, Binxing Fang, Xiao-chun Yun:

Adaptive Method for Monitoring Network and Early Detection of Internet Worms. 178-189 - SzeWang Fong, David B. Skillicorn

, Dmitri Roussinov:
Measures to Detect Word Substitution in Intercepted Communication. 190-200 - Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, William A. Wallace, Mohammed Javeed Zaki

:
Finding Hidden Group Structure in a Stream of Communications. 201-212 - Evrim Acar

, Seyit Ahmet Çamtepe
, Bülent Yener:
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications. 213-224 - Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner:

Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks. 225-236 - Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian:

DrillSim: A Simulation Framework for Emergency Response Drills. 237-248 - Ping Yan, Daniel Dajun Zeng, Hsinchun Chen:

A Review of Public Health Syndromic Surveillance Systems. 249-260
Infrastructure Protection and Cyber Security
- Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao:

A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks. 261-271 - Yan Zhai, Peng Ning, Jun Xu:

Integrating IDS Alert Correlation and OS-Level Dependency Tracking. 272-284 - Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi:

Attacking Confidentiality: An Agent Based Approach. 285-296 - Fangfang Liu

, Yan Chi, Yuliang Shi:
Viability of Critical Mission of Grid Computing. 297-307 - Siddharth Kaza, Yuan Wang, Hsinchun Chen:

Suspect Vehicle Identification for Border Safety with Modified Mutual Information. 308-318 - Saket Anand, David Madigan, Richard J. Mammone, Saumitr Pathak, Fred S. Roberts

:
Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures. 319-330
Terrorism Informatics and Countermeasures
- Christopher C. Yang, Nan Liu, Marc Sageman:

Analyzing the Terrorist Social Networks with Visualization Tools. 331-342 - Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei:

Tracing the Event Evolution of Terror Attacks from On-Line News. 343-354 - Robert G. Ross:

Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models. 355-366 - Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin:

On the Topology of the Dark Web of Terrorist Groups. 367-376 - Yael Shahar:

Indicators of Threat: Reflecting New Trends. 377-388 - Nasrullah Memon, Henrik Legind Larsen:

Practical Algorithms for Destabilizing Terrorist Networks. 389-400 - Joshua Sinai:

Combating Terrorism Insurgency Resolution Software: A Research Note. 401-406 - Laura Dugan, Gary LaFree, Heather Fogg:

A First Look at Domestic and International Global Terrorism Events, 1970-1997. 407-419
Emerging Applications
- Uwe Glässer, Sarah Rastkar, Mona Vajihollahi:

Computational Modeling and Experimental Validation of Aviation Security Procedures. 420-431 - Adnan Khashman, Akram A. Garad:

Intelligent Face Recognition Using Feature Averaging. 432-439 - Sangho Park, Mohan M. Trivedi:

Multi-perspective Video Analysis of Persons and Vehicles for Enhanced Situational Awareness. 440-451
Part II: Short Papers
Data Analysis, Knowledge Discovery, and Information Dissemination
- Yu Chen, Wesley W. Chu:

Database Security Protection Via Inference Detection. 452-458 - Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano:

An Embedded Bayesian Network Hidden Markov Model for Digital Forensics. 459-465 - Eric A. Bier, Edward W. Ishak, Ed Huai-hsin Chi:

Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading. 466-472 - Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Viner

:
Strategic Intelligence Analysis: From Information Processing to Meaning-Making. 473-478 - G. Alan Wang

, Hsinchun Chen, Homa Atabakhsh:
A Multi-layer Naïve Bayes Model for Approximate Identity Matching. 479-484 - Danilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado

:
Towards Optimal Police Patrol Routes with Genetic Algorithms. 485-491 - Amit Mathew, Amit P. Sheth, Leonidas Deligiannidis:

SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment. 492-497 - Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen:

A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan. 498-503 - Christie M. Fuller

, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon:
Detecting Deception in Person-of-Interest Statements. 504-509 - Antonio Badia

:
Personal Information Management (PIM) for Intelligence Analysis. 510-515 - Ragib Hasan

, Marianne Winslett:
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. 516-521
Access Control, Privacy, and Cyber Trust
- Ahmed HajYasien, Vladimir Estivill-Castro

, Rodney W. Topor:
Sanitization of Databases for Refined Privacy Trade-Offs. 522-528 - Joon S. Park, Joseph Giordano:

Access Control Requirements for Preventing Insider Threats. 529-534
Surveillance, Bioterrorism, and Emergency Response
- James F. McCarthy, Mukkai S. Krishnamoorthy:

Venn Diagram Construction of Internet Chatroom Conversations. 535-541 - Jian Ma, Daniel Dajun Zeng, Hsinchun Chen:

Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics. 542-547 - Xiaohua Hu, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm:

Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. 548-553 - Anna Yoffe, Yakov Ben-Haim

:
An Info-Gap Approach to Policy Selection for Bio-terror Response. 554-559 - David A. Bray

, Benn R. Konsynski:
Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities. 560-565 - William Zhu, Fei-Yue Wang:

Covering Based Granular Computing for Conflict Analysis. 566-571
Infrastructure Protection and Cyber Security
- Eul-Gyu Im

, Jung-Taek Seo
, Dong-Soo Kim, Yong Ho Song, Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations. 572-577 - Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao:

Worm Traffic Modeling for Network Performance Analysis. 578-583 - Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao:

Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors. 584-589 - Shukor Abd Razak

, Steven Furnell
, Nathan L. Clarke
, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. 590-595 - Sudarshan S. Chawathe:

Distributing the Cost of Securing a Transportation Infrastructure. 596-601
Terrorism Informatics
- Fu Lee Wang, Christopher C. Yang, Xiaodong Shi:

Multi-document Summarization for Terrorism Information Extraction. 602-608 - Don Radlauer:

Rational Choice Deterrence and Israeli Counter-Terrorism. 609-614 - Arab Salem

, Edna Reid, Hsinchun Chen:
Content Analysis of Jihadi Extremist Groups' Videos. 615-620 - Yilu Zhou, Jialun Qin, Guanpi Lai, Edna Reid, Hsinchun Chen:

Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums. 621-626
Emerging Applications
- Yanwu Xu, Xianbin Cao, Hong Qiao, Fei-Yue Wang:

Fast Pedestrian Detection Using Color Information. 627-632 - Je-Goon Ryu

, Se-Kee Kil, Hyeon-Min Shim, Sang-Moo Lee, Eung-Hyuk Lee, Seung-Hong Hong:
SG-Robot: CDMA Network-Operated Mobile Robot for Security Guard at Home. 633-638
Part III: Extended Abstracts for Posters and Demos
Data Analysis and Knowledge Discovery
- Samar Mouti

, Fadel Sukkar:
Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts. 639-641 - James S. Okolica, Gilbert L. Peterson

, Robert F. Mills:
Using Author Topic to Detect Insider Threats from Email Traffic. 642-643 - Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:

Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. 644-646 - Nazli Goharian, Alana Platt, Ophir Frieder:

On Off-Topic Web Browsing. 647-649 - Unil Yun, John J. Leggett, TeongJoo Ong:

Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints. 650-651 - Timothy Buennemeyer, John Booker, Andrew J. Sabri, Chris North:

Intelligence Analysis Using High Resolution Displays. 652-653 - Huizhang Shen

, Jidi Zhao, Ruipu Yao:
Privacy Preserving Mining of Global Association Rules on Distributed Dataset. 654-656 - Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han:

CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications. 657-658 - Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang:

KD3 Scheme for Privacy Preserving Data Mining. 659-661 - James D. Jones:

Using Logic Programming to Detect Deception on the Basis of Actions. 662-663 - Nishant Kumar, Jan De Beer, Jan Vanthienen

, Marie-Francine Moens:
Intelligent Information Retrieval Tools for Police. 664-665 - Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens:

Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction. 666-667 - James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson:

A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History. 668-670 - Nazli Goharian, Alana Platt:

Detection Using Clustering Query Results. 671-673 - Roger B. Bradford:

Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks. 674-675 - Dechang Pi, Xiaolin Qin, Wangfeng Gu:

Mining the Acceleration-Like Association Rules. 676-677 - Paul Thompson, Wei Zhang:

Analyzing Social Networks in E-Mail with Rich Syntactic Features. 678-679 - Mark Jyn-Huey Lim, Michael Negnevitsky

, Jacky Hartnett:
E-mail Traffic Analysis Using Visualisation and Decision Trees. 680-681 - Michael Wolverton, Ian W. Harrison, John D. Lowrance, Andres C. Rodriguez, Jérôme Thoméré:

Advanced Patterns and Matches in Link Analysis. 682-683
Data, Information, and Knowledge Management
- Li Yang, Joseph M. Kizza, Raimund K. Ege:

A Flexible Context-Aware Authorization Framework for Mediation Systems. 684-685 - Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg:

Continuous Authentication by Keystroke Dynamics Using Committee Machines. 686-687 - Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:

A Flexible and Scalable Access Control for Ubiquitous Computing Environments. 688-689 - Dalei Guo, Shuming Tang:

A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society. 690-691 - Terrance Goan, Emi Fujioka, Ryan Kaneshiro, Lynn Gasch:

Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection. 692-693 - Jim Wakefield:

Intelligence Use of Unstructured Data in a Data Warehouse Environment. 694-695
Threat Detection, Surveillance, and Emergency Response
- Cyril Onwubiko

, Andrew P. Lenaghan:
An Evolutionary Approach in Threats Detection for Distributed Security Defence Systems. 696-698 - Amar Singh, Lawrence B. Holder:

Classification of Threats Via a Multi-sensor Security Portal. 699-700 - Ignacio J. Martinez-Moyano, Eliot H. Rich, Stephen H. Conrad:

Exploring the Detection Process: Integrating Judgment and Outcome Decomposition. 701-703 - Selwyn Russell:

Issues in Merging Internet Autonomous Systems for Emergency Communications. 704-705 - Yaodong Li, Huiguang He

, Baihua Xiao, Chunheng Wang, Feiyue Wang:
CWME: A Framework of Group Support System for Emergency Responses. 706-707
Infrastructure Protection and Cyber Security
- Jungan Chen:

Abnormal Detection Algorithm Based on Match Range Model. 708-710 - Emmanuel Hooper:

Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks. 711-714 - Jing-Xin Wang, Zhiying Wang, Kui Dai:

A PCA-LVQ Model for Intrusion Alert Analysis. 715-716 - Jian Kang, Yuan Zhang, Jiu-bin Ju:

A Formalized Taxonomy of DDoS Attacks Based on Similarity. 717-719 - Chien-Chuan Lin, Ming-Shi Wang:

Practical Intrusion Detection Using Genetic-Clustering. 720-721 - Shao-Shin Hung, Damon Shing-Min Liu:

An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach. 722-723 - Byoung-Koo Kim, Young-Jun Heo, Jintae Oh:

Design and Implementation of FPGA Based High-Performance Intrusion Detection System. 724-725 - Hyun Joo Kim, Jung-Chan Na, Jong-Soo Jang:

Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis. 726-727 - William Eberle, Lawrence B. Holder:

Detecting Anomalies in Cargo Using Graph Properties. 728-730 - Yongsu Park, Yong Ho Song, Eul-Gyu Im

:
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. 731-732 - Mohammad M. Masud

, Latifur Khan
, Ehab Al-Shaer:
Email Worm Detection Using Naïve Bayes and Support Vector Machine. 733-734 - Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee:

An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. 735-736 - Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im:

A New Methodology of Analyzing Security Vulnerability for Network Services. 737-738 - Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han:

Using One-Time Password Based Authentication for Wireless IP Network. 739-740 - Taekyoung Kwon, Sang-ho Park:

Experimental Study on Wireless Sensor Network Security. 741-743
Terrorism Informatics
- Abu Md. Zafor Alam, Sajjad Waheed:

Terrorist Database: A Bangladesh Study. 744-745 - Abu Md. Zafor Alam, Abu Md. Siddique Alam, Mahjabeen Khan:

Terrorist Organizations and Effects of Terrorism in Bangladesh. 746-747 - Martine Naillon, Jean-François di Chiara, Bruno Eude, Christian Amathieux:

Decider.Track, a Revolutionary Cyber-Tracker for Antiterrorist Fight. 748-749 - Annette Sobel:

The Role of Information Superiority in the Global War on Terrorism. 750-752
Emerging Applications
- Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:

A Trust-Based Security Architecture for Ubiquitous Computing Systems. 753-754 - Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee:

A Trust Model for Uncertain Interactions in Ubiquitous Environments. 755-757 - D. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang:

A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles. 758-759 - Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:

A Home Firewall Solution for Securing Smart Spaces. 760-761 - Xinhong Zhang, Shejiao Li, Fan Zhang:

The Security Performance Evaluation of Digital Watermarking. 762-763 - Thian Song Ong

, Andrew Teoh Beng Jin
, David Ngo Chek Ling:
A Novel Key Release Scheme from Biometrics. 764-765 - Olcay Kursun

, Kenneth M. Reynolds, Oleg V. Favorov
:
Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases. 766-767

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














