4. ISI 2006:
San Diego,
CA,
USA
Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani M. Thuraisingham, Fei-Yue Wang (Eds.):
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings.
Lecture Notes in Computer Science 3975 Springer 2006, ISBN 3-540-34478-0 BibTeX
Part I:
Long Papers
Intelligence Analysis and Knowledge Discovery
- Douglas Yeung, John D. Lowrance:
Computer-Mediated Collaborative Reasoning and Intelligence Analysis.
1-13
Electronic Edition (link) BibTeX
- Byron Marshall, Hsinchun Chen:
Using Importance Flooding to Identify Interesting Networks of Criminal Activity.
14-25
Electronic Edition (link) BibTeX
- Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart, Tamara Oellinger, Camelia Ignat:
Towards Automatic Event Tracking.
26-34
Electronic Edition (link) BibTeX
- Yiming Ma, Dawit Yimam Seid:
Interactive Refinement of Filtering Queries on Streaming Intelligence Data.
35-47
Electronic Edition (link) BibTeX
- Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza:
Semantic Analytics Visualization.
48-59
Electronic Edition (link) BibTeX
- Ahmed Abbasi, Hsinchun Chen:
Visualizing Authorship for Identification.
60-71
Electronic Edition (link) BibTeX
- Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ronald Eaglin:
A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases.
72-82
Electronic Edition (link) BibTeX
- Aram Galstyan, Paul R. Cohen:
Iterative Relational Classification Through Three-State Epidemic Dynamics.
83-92
Electronic Edition (link) BibTeX
- David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers:
Analyzing Entities and Topics in News Articles Using Statistical Topic Models.
93-104
Electronic Edition (link) BibTeX
- Clayton T. Morrison, Paul R. Cohen:
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment.
105-116
Electronic Edition (link) BibTeX
Access Control,
Privacy,
and Cyber Trust
Surveillance and Emergency Response
- Xiaolei Li, Jiawei Han, Sangkyum Kim:
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects.
166-177
Electronic Edition (link) BibTeX
- Chen Bo, Binxing Fang, Xiao-chun Yun:
Adaptive Method for Monitoring Network and Early Detection of Internet Worms.
178-189
Electronic Edition (link) BibTeX
- SzeWang Fong, David B. Skillicorn, Dmitri Roussinov:
Measures to Detect Word Substitution in Intercepted Communication.
190-200
Electronic Edition (link) BibTeX
- Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, William A. Wallace, Mohammed Javeed Zaki:
Finding Hidden Group Structure in a Stream of Communications.
201-212
Electronic Edition (link) BibTeX
- Evrim Acar, Seyit Ahmet Çamtepe, Bülent Yener:
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.
213-224
Electronic Edition (link) BibTeX
- Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner:
Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks.
225-236
Electronic Edition (link) BibTeX
- Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian:
DrillSim: A Simulation Framework for Emergency Response Drills.
237-248
Electronic Edition (link) BibTeX
- Ping Yan, Daniel Dajun Zeng, Hsinchun Chen:
A Review of Public Health Syndromic Surveillance Systems.
249-260
Electronic Edition (link) BibTeX
Infrastructure Protection and Cyber Security
- Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao:
A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks.
261-271
Electronic Edition (link) BibTeX
- Yan Zhai, Peng Ning, Jun Xu:
Integrating IDS Alert Correlation and OS-Level Dependency Tracking.
272-284
Electronic Edition (link) BibTeX
- Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi:
Attacking Confidentiality: An Agent Based Approach.
285-296
Electronic Edition (link) BibTeX
- Fangfang Liu, Yan Chi, Yuliang Shi:
Viability of Critical Mission of Grid Computing.
297-307
Electronic Edition (link) BibTeX
- Siddharth Kaza, Yuan Wang, Hsinchun Chen:
Suspect Vehicle Identification for Border Safety with Modified Mutual Information.
308-318
Electronic Edition (link) BibTeX
- Saket Anand, David Madigan, Richard J. Mammone, Saumitr Pathak, Fred Roberts:
Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures.
319-330
Electronic Edition (link) BibTeX
Terrorism Informatics and Countermeasures
- Christopher C. Yang, Nan Liu, Marc Sageman:
Analyzing the Terrorist Social Networks with Visualization Tools.
331-342
Electronic Edition (link) BibTeX
- Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei:
Tracing the Event Evolution of Terror Attacks from On-Line News.
343-354
Electronic Edition (link) BibTeX
- Robert G. Ross:
Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models.
355-366
Electronic Edition (link) BibTeX
- Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin:
On the Topology of the Dark Web of Terrorist Groups.
367-376
Electronic Edition (link) BibTeX
- Yael Shahar:
Indicators of Threat: Reflecting New Trends.
377-388
Electronic Edition (link) BibTeX
- Nasrullah Memon, Henrik Legind Larsen:
Practical Algorithms for Destabilizing Terrorist Networks.
389-400
Electronic Edition (link) BibTeX
- Joshua Sinai:
Combating Terrorism Insurgency Resolution Software: A Research Note.
401-406
Electronic Edition (link) BibTeX
- Laura Dugan, Gary LaFree, Heather Fogg:
A First Look at Domestic and International Global Terrorism Events, 1970-1997.
407-419
Electronic Edition (link) BibTeX
Emerging Applications
Part II:
Short Papers
Data Analysis,
Knowledge Discovery,
and Information Dissemination
- Yu Chen, Wesley W. Chu:
Database Security Protection Via Inference Detection.
452-458
Electronic Edition (link) BibTeX
- Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano:
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.
459-465
Electronic Edition (link) BibTeX
- Eric A. Bier, Edward W. Ishak, Ed Chi:
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading.
466-472
Electronic Edition (link) BibTeX
- Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Viner:
Strategic Intelligence Analysis: From Information Processing to Meaning-Making.
473-478
Electronic Edition (link) BibTeX
- G. Alan Wang, Hsinchun Chen, Homa Atabakhsh:
A Multi-layer Naïve Bayes Model for Approximate Identity Matching.
479-484
Electronic Edition (link) BibTeX
- Danilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado:
Towards Optimal Police Patrol Routes with Genetic Algorithms.
485-491
Electronic Edition (link) BibTeX
- Amit Mathew, Amit P. Sheth, Leonidas Deligiannidis:
SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment.
492-497
Electronic Edition (link) BibTeX
- Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen:
A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.
498-503
Electronic Edition (link) BibTeX
- Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker, Steven Coulon:
Detecting Deception in Person-of-Interest Statements.
504-509
Electronic Edition (link) BibTeX
- Antonio Badia:
Personal Information Management (PIM) for Intelligence Analysis.
510-515
Electronic Edition (link) BibTeX
- Ragib Hasan, Marianne Winslett:
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.
516-521
Electronic Edition (link) BibTeX
Access Control,
Privacy,
and Cyber Trust
Surveillance,
Bioterrorism,
and Emergency Response
- James F. McCarthy, Mukkai S. Krishnamoorthy:
Venn Diagram Construction of Internet Chatroom Conversations.
535-541
Electronic Edition (link) BibTeX
- Jian Ma, Daniel Dajun Zeng, Hsinchun Chen:
Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.
542-547
Electronic Edition (link) BibTeX
- Xiaohua Hu, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm:
Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons.
548-553
Electronic Edition (link) BibTeX
- Anna Yoffe, Yakov Ben-Haim:
An Info-Gap Approach to Policy Selection for Bio-terror Response.
554-559
Electronic Edition (link) BibTeX
- David A. Bray, Benn R. Konsynski:
Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities.
560-565
Electronic Edition (link) BibTeX
- William Zhu, Fei-Yue Wang:
Covering Based Granular Computing for Conflict Analysis.
566-571
Electronic Edition (link) BibTeX
Infrastructure Protection and Cyber Security
- Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations.
572-577
Electronic Edition (link) BibTeX
- Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao:
Worm Traffic Modeling for Network Performance Analysis.
578-583
Electronic Edition (link) BibTeX
- Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao:
Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors.
584-589
Electronic Edition (link) BibTeX
- Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
590-595
Electronic Edition (link) BibTeX
- Sudarshan S. Chawathe:
Distributing the Cost of Securing a Transportation Infrastructure.
596-601
Electronic Edition (link) BibTeX
Terrorism Informatics
Emerging Applications
Part III:
Extended Abstracts for Posters and Demos
Data Analysis and Knowledge Discovery
- Samar Mouti, Fadel Sukkar:
Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts.
639-641
Electronic Edition (link) BibTeX
- James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using Author Topic to Detect Insider Threats from Email Traffic.
642-643
Electronic Edition (link) BibTeX
- Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.
644-646
Electronic Edition (link) BibTeX
- Nazli Goharian, Alana Platt, Ophir Frieder:
On Off-Topic Web Browsing.
647-649
Electronic Edition (link) BibTeX
- Unil Yun, John J. Leggett, TeongJoo Ong:
Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints.
650-651
Electronic Edition (link) BibTeX
- Timothy Buennemeyer, John Booker, Andrew J. Sabri, Chris North:
Intelligence Analysis Using High Resolution Displays.
652-653
Electronic Edition (link) BibTeX
- Huizhang Shen, Jidi Zhao, Ruipu Yao:
Privacy Preserving Mining of Global Association Rules on Distributed Dataset.
654-656
Electronic Edition (link) BibTeX
- Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han:
CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications.
657-658
Electronic Edition (link) BibTeX
- Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang:
KD3 Scheme for Privacy Preserving Data Mining.
659-661
Electronic Edition (link) BibTeX
- James D. Jones:
Using Logic Programming to Detect Deception on the Basis of Actions.
662-663
Electronic Edition (link) BibTeX
- Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens:
Intelligent Information Retrieval Tools for Police.
664-665
Electronic Edition (link) BibTeX
- Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens:
Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction.
666-667
Electronic Edition (link) BibTeX
- James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson:
A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History.
668-670
Electronic Edition (link) BibTeX
- Nazli Goharian, Alana Platt:
Detection Using Clustering Query Results.
671-673
Electronic Edition (link) BibTeX
- R. B. Bradford:
Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks.
674-675
Electronic Edition (link) BibTeX
- Dechang Pi, Xiaolin Qin, Wangfeng Gu:
Mining the Acceleration-Like Association Rules.
676-677
Electronic Edition (link) BibTeX
- Paul Thompson, Wei Zhang:
Analyzing Social Networks in E-Mail with Rich Syntactic Features.
678-679
Electronic Edition (link) BibTeX
- Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett:
E-mail Traffic Analysis Using Visualisation and Decision Trees.
680-681
Electronic Edition (link) BibTeX
- Michael Wolverton, Ian W. Harrison, John D. Lowrance, Andrés Rodríguez, Jérôme Thoméré:
Advanced Patterns and Matches in Link Analysis.
682-683
Electronic Edition (link) BibTeX
Data,
Information,
and Knowledge Management
- Li Yang, Joseph M. Kizza, Raimund K. Ege:
A Flexible Context-Aware Authorization Framework for Mediation Systems.
684-685
Electronic Edition (link) BibTeX
- Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg:
Continuous Authentication by Keystroke Dynamics Using Committee Machines.
686-687
Electronic Edition (link) BibTeX
- Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Flexible and Scalable Access Control for Ubiquitous Computing Environments.
688-689
Electronic Edition (link) BibTeX
- Dalei Guo, Shuming Tang:
A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society.
690-691
Electronic Edition (link) BibTeX
- Terrance Goan, Emi Fujioka, Ryan Kaneshiro, Lynn Gasch:
Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection.
692-693
Electronic Edition (link) BibTeX
- Jim Wakefield:
Intelligence Use of Unstructured Data in a Data Warehouse Environment.
694-695
Electronic Edition (link) BibTeX
Threat Detection,
Surveillance,
and Emergency Response
Infrastructure Protection and Cyber Security
- Jungan Chen:
Abnormal Detection Algorithm Based on Match Range Model.
708-710
Electronic Edition (link) BibTeX
- Emmanuel Hooper:
Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks.
711-714
Electronic Edition (link) BibTeX
- Jing-Xin Wang, Zhiying Wang, Kui Dai:
A PCA-LVQ Model for Intrusion Alert Analysis.
715-716
Electronic Edition (link) BibTeX
- Jian Kang, Yuan Zhang, Jiu-bin Ju:
A Formalized Taxonomy of DDoS Attacks Based on Similarity.
717-719
Electronic Edition (link) BibTeX
- Chien-Chuan Lin, Ming-Shi Wang:
Practical Intrusion Detection Using Genetic-Clustering.
720-721
Electronic Edition (link) BibTeX
- Shao-Shin Hung, Damon Shing-Min Liu:
An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach.
722-723
Electronic Edition (link) BibTeX
- Byoung-Koo Kim, Young-Jun Heo, Jin-Tae Oh:
Design and Implementation of FPGA Based High-Performance Intrusion Detection System.
724-725
Electronic Edition (link) BibTeX
- Hyun Joo Kim, Jung-Chan Na, Jong S. Jang:
Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis.
726-727
Electronic Edition (link) BibTeX
- William Eberle, Lawrence B. Holder:
Detecting Anomalies in Cargo Using Graph Properties.
728-730
Electronic Edition (link) BibTeX
- Yongsu Park, Yong Ho Song, Eul-Gyu Im:
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
731-732
Electronic Edition (link) BibTeX
- Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer:
Email Worm Detection Using Naïve Bayes and Support Vector Machine.
733-734
Electronic Edition (link) BibTeX
- Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee:
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.
735-736
Electronic Edition (link) BibTeX
- Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im:
A New Methodology of Analyzing Security Vulnerability for Network Services.
737-738
Electronic Edition (link) BibTeX
- Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han:
Using One-Time Password Based Authentication for Wireless IP Network.
739-740
Electronic Edition (link) BibTeX
- Taekyoung Kwon, Sang-ho Park:
Experimental Study on Wireless Sensor Network Security.
741-743
Electronic Edition (link) BibTeX
Terrorism Informatics
Emerging Applications
- Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:
A Trust-Based Security Architecture for Ubiquitous Computing Systems.
753-754
Electronic Edition (link) BibTeX
- Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee:
A Trust Model for Uncertain Interactions in Ubiquitous Environments.
755-757
Electronic Edition (link) BibTeX
- D. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang:
A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles.
758-759
Electronic Edition (link) BibTeX
- Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Home Firewall Solution for Securing Smart Spaces.
760-761
Electronic Edition (link) BibTeX
- Xinhong Zhang, Shejiao Li, Fan Zhang:
The Security Performance Evaluation of Digital Watermarking.
762-763
Electronic Edition (link) BibTeX
- Ong Song, Andrew Teoh Beng Jin, David Ngo Chek Ling:
A Novel Key Release Scheme from Biometrics.
764-765
Electronic Edition (link) BibTeX
- Olcay Kursun, Kenneth M. Reynolds, Oleg V. Favorov:
Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases.
766-767
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:25:35 2009
by Michael Ley (ley@uni-trier.de)