3. ISI 2005:
Atlanta,
Georgia,
USA
Paul B. Kantor, Gheorghe Muresan, Fred Roberts, Daniel Dajun Zeng, Fei-Yue Wang, Hsinchun Chen, Ralph C. Merkle (Eds.):
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings.
Lecture Notes in Computer Science 3495 Springer 2005, ISBN 3-540-25999-6
Long Papers
Data and Text Mining
- Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam:
Collusion Set Detection Through Outlier Discovery.
1-13
- John Galloway, Simeon J. Simoff:
Digging in the Details: A Case Study in Network Data Mining.
14-26
- Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail:
Efficient Identification of Overlapping Communities.
27-36
- Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna:
Event-Driven Document Selection for Terrorism Information Extraction.
37-48
- Antonio Badia, Mehmed M. Kantardzic:
Link Analysis Tools for Intelligence and Counterterrorism.
49-59
- Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael Atwood:
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature.
60-71
- Justin Z. Zhan, Stan Matwin, LiWu Chang:
Private Mining of Association Rules.
72-80
Infrastructure Protection and Emergency Response
Information Management
Deception Detection and Authorship Analysis
Monitoring and Surveillance
- Ambareen Siraj, Rayford B. Vaughn:
A Cognitive Model for Alert Correlation in a Distributed Environment.
218-230
- David B. Skillicorn:
Beyond Keyword Filtering for Message and Conversation Detection.
231-243
- Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel:
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).
244-255
- Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
Modeling and Multiway Analysis of Chatroom Tensors.
256-268
- Yosef A. Solewicz, Moshe Koppel:
Selective Fusion for Speaker Verification in Surveillance.
269-279
Terrorism Informatics
- Joshua Sinai:
A New Conceptual Framework to Resolve Terrorism's Root Causes.
280-286
- Jialun Qin, Jennifer Jie Xu, Daning Hu, Marc Sageman, Hsinchun Chen:
Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.
287-304
- David Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III:
A Conceptual Model of Counterterrorist Operations.
305-315
- Peter S. Probst:
Measuring Success in Countering Terrorism: Problems and Pitfalls.
316-321
- Edna Reid, Hsinchun Chen:
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.
322-339
- Laura Dugan, Gary LaFree, Alex R. Piquero:
Testing a Rational Choice Model of Airline Hijackings.
340-361
Short Papers
Data and Text Mining
- Hilmi Günes Kayacik, A. Nur Zincir-Heywood:
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.
362-367
- Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen:
Discovering Identity Problems: A Case Study.
368-373
- R. B. Bradford:
Efficient Discovery of New Information in Large Text Databases.
374-380
- Ozgur Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy:
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.
381-388
- Janusz Wnek:
LSI-Based Taxonomy Generation: The Taxonomist System.
389-394
- Qing Tao, Gao-wei Wu, Fei-Yue Wang, Jue Wang:
Some Marginal Learning Algorithms for Unsupervised Problems.
395-401
Information Management and Sharing
- Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc Sageman, Gabriel Weimann, Hsinchun Chen:
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.
402-411
- Paul Jen-Hwa Hu, Daniel Dajun Zeng, Hsinchun Chen, Catherine A. Larson, Wei Chang, Chunju Tseng:
Evaluating an Infectious Disease Information Sharing and Analysis System.
412-417
- Dmitri Roussinov, Jose Antonio Robles-Flores:
How Question Answering Technology Helps to Locate Malevolent Online Content.
418-421
- Shuang Sun, John Yen:
Information Supply Chain: A Unified Framework for Information-Sharing.
422-428
- Guoray Cai, Alan M. MacEachren, Isaac Brewer, Michael D. McNeese, Rajeev Sharma, Sven Fuhrmann:
Map-Mediated GeoCollaborative Crisis Management.
429-435
- Clive Best, Erik Van der Goot, Monica de Paola:
Thematic Indicators Derived from World News Reports.
436-447
Copyright and Privacy Protection
Deception Detection
Information Security and Intrusion Detection
- Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal:
Active Automation of the DITSCAP.
479-485
- Boanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palaniswami, Amit P. Sheth:
An Ontological Approach to the Document Access Problem of Insider Threat.
486-491
- Gregory J. Conti, Mustaque Ahamad, Robert Norback:
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.
492-497
- Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi, Arijit Laha:
Intrusion Detection System Using Sequence and Set Preserving Metric.
498-504
- Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan:
The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.
505-510
- Dae-Ki Kang, Doug Fuller, Vasant Honavar:
Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.
511-516
Infrastructure Protection and Emergency Response
- Zhengtao Xiang, Yufeng Chen, Wei Jian, Fei Yan:
A Jackson Network-Based Model for Quantitative Analysis of Network Security.
517-522
- David R. B. Stockwell, Jason T. L. Wang:
Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.
523-529
- Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno:
CODESSEAL: Compiler/FPGA Approach to Secure Applications.
530-535
- Kelvin H. L. Wong, Mingchun Luo:
Computational Tool in Infrastructure Emergency Total Evacuation Analysis.
536-542
- Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno:
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.
543-548
- Xinjian Chen, Jie Tian, Qi Su, Xin Yang, Fei-Yue Wang:
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.
549-553
Terrorism Informatics
- Yael Shahar:
Connections in the World of International Terrorism.
554-560
- Sundri K. Khalsa:
Forecasting Terrorism: Indicators and Proven Analytic Techniques.
561-566
- Joshua Sinai:
Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN.
567-570
- Scott Tousley:
The Qualitative Challenge of Insurgency Informatics.
571-578
- Robert J. Latino:
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.
579-589
Extended Abstracts for Posters and Demos
Data and Text Mining
- Huizhang Shen, Jidi Zhao, Ying Peng:
A Group Decision-Support Method for Search and Rescue Based on Markov Chain.
590-592
- Suwimon Kooptiwoot, Muhammad Abdus Salam:
A New Relationship Form in Data Mining.
593-594
- Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best:
A Study of "Root Causes of Conflict" Using Latent Semantic Analysis.
595-596
- Tiantian Qin, Judee K. Burgoon:
An Empirical Study on Dynamic Effects on Deception Detection.
597-599
- Ana Isabel Canhoto, James Backhouse:
Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff.
600-601
- Robert J. Price, Anthony E. Zukas:
Application of Latent Semantic Indexing to Processing of Noisy Text.
602-603
- Nazli Goharian, Ling Ma, Chris Meyers:
Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques.
604-605
- Wei Sun, Da-xin Liu:
Mining Schemas in Semistructured Data Using Fuzzy Decision Trees.
606-607
- Boyd Davis, Vivian Lord, Peyton Mason:
More Than a Summary: Stance-Shift Analysis.
608-609
- Zeng-Guang Hou:
Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots.
610-611
Information Management and Sharing
- Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Wei Chang, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher:
BioPortal: Sharing and Analyzing Infectious Disease Information.
612-613
- Jin Zhu:
DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information.
614-616
- Alan J. Demers, Johannes Gehrke, Mingsheng Hong, Mirek Riedewald:
Processing High-Speed Intelligence Feeds in Real-Time.
617-618
- Robert P. Schumaker, Hsinchun Chen:
Question Answer TARA: A Terrorism Activity Resource Application.
619-620
- Boanerges Aleman-Meza, Christian Halaschek-Wiener, Satya Sanket Sahoo, Amit P. Sheth, Ismailcem Budak Arpinar:
Template Based Semantic Similarity for Security Applications.
621-622
- Jialun Qin, Yilu Zhou, Guanpi Lai, Edna Reid, Marc Sageman, Hsinchun Chen:
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web.
623-624
- Guanpi Lai, Fei-Yue Wang:
Toward an ITS Specific Knowledge Engine.
625-626
Information Security and Intrusion Detection
- Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen:
A Blind Image Watermarking Using for Copyright Protection and Tracing.
627-628
- Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park:
Towards an Effective Wireless Security Policy for Sensitive Organizations.
629-630
- Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta:
A Taxonomy of Cyber Attacks on 3G Networks.
631-633
- Eul-Gyu Im, Yong Ho Song:
An Adaptive Approach to Handle DoS Attack for Web Services.
634-635
- Ram Dantu, João W. Cangussu:
An Architecture for Network Security Using Feedback Control.
636-637
- Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee:
Defending a Web Browser Against Spying with Browser Helper Objects.
638-639
- Zhengyou Xia, Yichuan Jiang, Jian Wang:
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet.
640-641
- Young-Hwan Oh, Hae-Young Bae:
Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel.
642-643
- Shiuh-Jeng Wang, Cheng-Hsing Yang:
Gathering Digital Evidence in Response to Information Security Incidents.
644-645
- William Zhu, Clark D. Thomborson:
On the QP Algorithm in Software Watermarking.
646-647
- Anirban Majumdar, Clark D. Thomborson:
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation.
648-649
- Yong Ho Song, Eul-Gyu Im:
Secure Contents Distribution Using Flash Memory Technology.
650-651
Infrastructure Protection and Emergency Response
- Richard A. Smith:
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities.
652-653
- Syed Naqvi, Michel Riguidel:
Securing Grid-Based Critical Infrastructures.
654-655
- David Zimmermann:
The Safety Alliance of Cushing - A Model Example of Cooperation as an Effective Counterterrorism Tool.
656-657
Surveillance,
Border Protection,
and Transportation Systems
- Xiaoyan Gong, Haijun Gao:
A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques.
658-659
- Shuming Tang, Haijun Gao:
An Agent-Based Framework for a Traffic Security Management System.
660-661
- Hong Qiao, Fei-Yue Wang, Xianbin Cao:
Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle.
662-663
- Xianbin Cao, Hong Qiao, Fei-Yue Wang, Xinzheng Zhang:
Application of Cooperative Co-evolution in Pedestrian Detection Systems.
664-665
- Sundaram Jayakumar, Chandramohan Senthilkumar:
Biometric Fingerprints Based Radio Frequency Identification.
666-668
- Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen:
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.
669-670
Copyright © Fri Mar 12 17:17:07 2010
by Michael Ley (ley@uni-trier.de)