2. ISI 2004:
Tucson,
AZ,
USA
Hsinchun Chen, Reagan Moore, Daniel Dajun Zeng, John Leavitt (Eds.):
Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings.
Lecture Notes in Computer Science 3073 Springer 2004, ISBN 978-3-540-22125-8 BibTeX
Full Papers
Bioterrorism and Disease Informatics
- Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas B. Fridsma, Alex Yahja:
Aligning Simulation Models of Smallpox Outbreaks.
1-16 BibTeX
- Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki:
Data Analytics for Bioterrorism Surveillance.
17-27 BibTeX
- Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher:
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics.
28-41 BibTeX
Data Access Control,
Privacy,
and Trust Management
Data Management and Mining
- David B. Skillicorn:
Finding Unusual Correlation Using Matrix Decompositions.
83-99 BibTeX
- Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien:
Generating Concept Hierarchies from Text for Intelligence Analysis.
100-113 BibTeX
- Antonio Badia:
Interactive Query Languages for Intelligence Tasks.
114-124 BibTeX
- Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen:
Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.
125-145 BibTeX
- Alan J. Demers, Johannes Gehrke, Mirek Riedewald:
The Architecture of the Cornell Knowledge Broker.
146-162 BibTeX
Deception Detection
- Jinwei Cao, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins:
Computer-Based Training for Deception Detection: What Users Want?
163-175 BibTeX
- Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Ismail:
Identifying Multi-ID Users in Open Forums.
176-186 BibTeX
- Kent Marett, David P. Biros, Monti L. Knode:
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training.
187-200 BibTeX
Information Assurance and Infrastructure Protection
Monitoring and Surveillance
- Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
A Tool for Internet Chatroom Surveillance.
252-265 BibTeX
- Jason Bengel, Susan Gauch, Eera Mittur, Rajan Vijayaraghavan:
ChatTrack: Chat Room Topic Detection Using Classification.
266-277 BibTeX
- Naren Kodali, Csilla Farkas, Duminda Wijesekera:
SECRETS: A Secure Real-Time Multimedia Surveillance System.
278-296 BibTeX
- Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka, Bülent Yener:
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information.
297-306 BibTeX
- Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera:
THEMIS: Threat Evaluation Metamodel for Information Systems.
307-321 BibTeX
Security Policies and Evaluation
Social Network Analysis
Short Papers
Deception Detection
Data/Text Management and Mining
Information Assurance and Infrastructure Protection
- Jorge Levera, Benjamín Barán, Robert L. Grossman:
Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data.
457-466 BibTeX
- Homa Atabakhsh, Cathy Larson, Tim Petersen, Chuck Violette, Hsinchun Chen:
Information Sharing and Collaboration Policies within Government Agencies.
467-475 BibTeX
- Myung-Kyu Yi, Chong-Sun Hwang:
Intrusion-Tolerant Intrusion Detection System.
476-483 BibTeX
- Benjamin B. M. Shao:
Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy.
484-491 BibTeX
- Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilmazel, Robert Del Zoppo, Eric Brown, Matt Downey:
Semantic Analysis for Monitoring Insider Threats.
492-500 BibTeX
- Anand Natarajan, Liaquat Hossain:
Towards a Social Network Approach for Monitoring Insider Threats to Information Security.
501-507 BibTeX
Extended Abstracts for Posters
- Eric Hughes, Amy Kazura, Arnie Rosenthal:
Policy-Based Information Sharing with Semantics.
508-509 BibTeX
- Robert H. Warren, Christopher Leurer:
Determining the Gender of the Unseen Name through Hyphenation.
510-511 BibTeX
- Raj Sharman, Himabindu Challapalli, H. Raghav Rao, Shambhu J. Upadhyaya:
A Framework for a Secure Federated Patient Healthcare System.
512-513 BibTeX
- Eung Ki Park, Jung-Taek Seo, Eul-Gyu Im, Cheolwon Lee:
Vulnerability Analysis and Evaluation within an Intranet.
514-515 BibTeX
- Susan M. Merritt, Allen Stix, Judith E. Sullivan:
Security Informatics: A Paradigm Shift in Information Technology Education.
516-517 BibTeX
- Yufeng Chen, Yabo Dong, Dongming Lu, Zhengtao Xiang:
Research of Characteristics of Worm Traffic.
518-519 BibTeX
Panel Discussion Papers
Copyright © Sat May 16 23:25:36 2009
by Michael Ley (ley@uni-trier.de)