4. ISI 2006:
San Diego,
CA,
USA
Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani M. Thuraisingham, Fei-Yue Wang (Eds.):
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings.
Lecture Notes in Computer Science 3975 Springer 2006, ISBN 3-540-34478-0
Part I:
Long Papers
Intelligence Analysis and Knowledge Discovery
- Douglas Yeung, John D. Lowrance:
Computer-Mediated Collaborative Reasoning and Intelligence Analysis.
1-13
- Byron Marshall, Hsinchun Chen:
Using Importance Flooding to Identify Interesting Networks of Criminal Activity.
14-25
- Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart, Tamara Oellinger, Camelia Ignat:
Towards Automatic Event Tracking.
26-34
- Yiming Ma, Dawit Yimam Seid:
Interactive Refinement of Filtering Queries on Streaming Intelligence Data.
35-47
- Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza:
Semantic Analytics Visualization.
48-59
- Ahmed Abbasi, Hsinchun Chen:
Visualizing Authorship for Identification.
60-71
- Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ronald Eaglin:
A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases.
72-82
- Aram Galstyan, Paul R. Cohen:
Iterative Relational Classification Through Three-State Epidemic Dynamics.
83-92
- David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers:
Analyzing Entities and Topics in News Articles Using Statistical Topic Models.
93-104
- Clayton T. Morrison, Paul R. Cohen:
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment.
105-116
Access Control,
Privacy,
and Cyber Trust
Surveillance and Emergency Response
- Xiaolei Li, Jiawei Han, Sangkyum Kim:
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects.
166-177
- Chen Bo, Binxing Fang, Xiao-chun Yun:
Adaptive Method for Monitoring Network and Early Detection of Internet Worms.
178-189
- SzeWang Fong, David B. Skillicorn, Dmitri Roussinov:
Measures to Detect Word Substitution in Intercepted Communication.
190-200
- Jeffrey Baumes, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, William A. Wallace, Mohammed Javeed Zaki:
Finding Hidden Group Structure in a Stream of Communications.
201-212
- Evrim Acar, Seyit Ahmet Çamtepe, Bülent Yener:
Collective Sampling and Analysis of High Order Tensors for Chatroom Communications.
213-224
- Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner:
Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks.
225-236
- Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian:
DrillSim: A Simulation Framework for Emergency Response Drills.
237-248
- Ping Yan, Daniel Dajun Zeng, Hsinchun Chen:
A Review of Public Health Syndromic Surveillance Systems.
249-260
Infrastructure Protection and Cyber Security
- Wei Wei, Yabo Dong, Dongming Lu, Guang Jin, Honglan Lao:
A Novel Mechanism to Defend Against Low-Rate Denial-of-Service Attacks.
261-271
- Yan Zhai, Peng Ning, Jun Xu:
Integrating IDS Alert Correlation and OS-Level Dependency Tracking.
272-284
- Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, Ashraf U. Kazi:
Attacking Confidentiality: An Agent Based Approach.
285-296
- Fangfang Liu, Yan Chi, Yuliang Shi:
Viability of Critical Mission of Grid Computing.
297-307
- Siddharth Kaza, Yuan Wang, Hsinchun Chen:
Suspect Vehicle Identification for Border Safety with Modified Mutual Information.
308-318
- Saket Anand, David Madigan, Richard J. Mammone, Saumitr Pathak, Fred Roberts:
Experimental Analysis of Sequential Decision Making Algorithms for Port of Entry Inspection Procedures.
319-330
Terrorism Informatics and Countermeasures
- Christopher C. Yang, Nan Liu, Marc Sageman:
Analyzing the Terrorist Social Networks with Visualization Tools.
331-342
- Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei:
Tracing the Event Evolution of Terror Attacks from On-Line News.
343-354
- Robert G. Ross:
Measuring Effectiveness of Anti-terrorism Programs Using Performance Logic Models.
355-366
- Jennifer Jie Xu, Hsinchun Chen, Yilu Zhou, Jialun Qin:
On the Topology of the Dark Web of Terrorist Groups.
367-376
- Yael Shahar:
Indicators of Threat: Reflecting New Trends.
377-388
- Nasrullah Memon, Henrik Legind Larsen:
Practical Algorithms for Destabilizing Terrorist Networks.
389-400
- Joshua Sinai:
Combating Terrorism Insurgency Resolution Software: A Research Note.
401-406
- Laura Dugan, Gary LaFree, Heather Fogg:
A First Look at Domestic and International Global Terrorism Events, 1970-1997.
407-419
Emerging Applications
Part II:
Short Papers
Data Analysis,
Knowledge Discovery,
and Information Dissemination
- Yu Chen, Wesley W. Chu:
Database Security Protection Via Inference Detection.
452-458
- Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tibério S. Caetano:
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics.
459-465
- Eric A. Bier, Edward W. Ishak, Ed Chi:
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading.
466-472
- Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldberg, Amir Viner:
Strategic Intelligence Analysis: From Information Processing to Meaning-Making.
473-478
- G. Alan Wang, Hsinchun Chen, Homa Atabakhsh:
A Multi-layer Naïve Bayes Model for Approximate Identity Matching.
479-484
- Danilo Reis, Adriano Melo, André L. V. Coelho, Vasco Furtado:
Towards Optimal Police Patrol Routes with Genetic Algorithms.
485-491
- Amit Mathew, Amit P. Sheth, Leonidas Deligiannidis:
SemanticSpy: Suspect Tracking Using Semantic Data in a Multimedia Environment.
492-497
- Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen:
A Framework for Exploring Gray Web Forums: Analysis of Forum-Based Communities in Taiwan.
498-503
- Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker, Steven Coulon:
Detecting Deception in Person-of-Interest Statements.
504-509
- Antonio Badia:
Personal Information Management (PIM) for Intelligence Analysis.
510-515
- Ragib Hasan, Marianne Winslett:
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.
516-521
Access Control,
Privacy,
and Cyber Trust
Surveillance,
Bioterrorism,
and Emergency Response
- James F. McCarthy, Mukkai S. Krishnamoorthy:
Venn Diagram Construction of Internet Chatroom Conversations.
535-541
- Jian Ma, Daniel Dajun Zeng, Hsinchun Chen:
Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics.
542-547
- Xiaohua Hu, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm:
Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons.
548-553
- Anna Yoffe, Yakov Ben-Haim:
An Info-Gap Approach to Policy Selection for Bio-terror Response.
554-559
- David A. Bray, Benn R. Konsynski:
Fighting Fear of a Bioterrorism Event with Information Technology: Real-World Examples and Opportunities.
560-565
- William Zhu, Fei-Yue Wang:
Covering Based Granular Computing for Conflict Analysis.
566-571
Infrastructure Protection and Cyber Security
- Eul-Gyu Im, Jung-Taek Seo, Dong-Soo Kim, Yong Ho Song, Yongsu Park:
Hybrid Modeling for Large-Scale Worm Propagation Simulations.
572-577
- Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao:
Worm Traffic Modeling for Network Performance Analysis.
578-583
- Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao:
Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors.
584-589
- Shukor A. Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
590-595
- Sudarshan S. Chawathe:
Distributing the Cost of Securing a Transportation Infrastructure.
596-601
Terrorism Informatics
Emerging Applications
Part III:
Extended Abstracts for Posters and Demos
Data Analysis and Knowledge Discovery
- Samar Mouti, Fadel Sukkar:
Design of Syntactical Morphological and Semantical Analyzer (SMSA) for Processing Arabic Texts.
639-641
- James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using Author Topic to Detect Insider Threats from Email Traffic.
642-643
- Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.
644-646
- Nazli Goharian, Alana Platt, Ophir Frieder:
On Off-Topic Web Browsing.
647-649
- Unil Yun, John J. Leggett, TeongJoo Ong:
Mining Weighted Sequential Patterns Based on Length-Decreasing Support Constraints.
650-651
- Timothy Buennemeyer, John Booker, Andrew J. Sabri, Chris North:
Intelligence Analysis Using High Resolution Displays.
652-653
- Huizhang Shen, Jidi Zhao, Ruipu Yao:
Privacy Preserving Mining of Global Association Rules on Distributed Dataset.
654-656
- Won-Sik Kim, Woong-Kee Loh, Wook-Shin Han:
CC-GiST: Cache Conscious-Generalized Search Tree for Supporting Various Fast Intelligent Applications.
657-658
- Peng Zhang, Yunhai Tong, Shiwei Tang, Dongqing Yang:
KD3 Scheme for Privacy Preserving Data Mining.
659-661
- James D. Jones:
Using Logic Programming to Detect Deception on the Basis of Actions.
662-663
- Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens:
Intelligent Information Retrieval Tools for Police.
664-665
- Nishant Kumar, Jan De Beer, Jan Vanthienen, Marie-Francine Moens:
Evaluation of Information Retrieval and Text Mining Tools on Automatic Named Entity Extraction.
666-667
- James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson:
A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History.
668-670
- Nazli Goharian, Alana Platt:
Detection Using Clustering Query Results.
671-673
- R. B. Bradford:
Application of Latent Semantic Indexing in Generating Graphs of Terrorist Networks.
674-675
- Dechang Pi, Xiaolin Qin, Wangfeng Gu:
Mining the Acceleration-Like Association Rules.
676-677
- Paul Thompson, Wei Zhang:
Analyzing Social Networks in E-Mail with Rich Syntactic Features.
678-679
- Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett:
E-mail Traffic Analysis Using Visualisation and Decision Trees.
680-681
- Michael Wolverton, Ian W. Harrison, John D. Lowrance, Andrés Rodríguez, Jérôme Thoméré:
Advanced Patterns and Matches in Link Analysis.
682-683
Data,
Information,
and Knowledge Management
- Li Yang, Joseph M. Kizza, Raimund K. Ege:
A Flexible Context-Aware Authorization Framework for Mediation Systems.
684-685
- Sergio Roberto de Lima e Silva Filho, Mauro Roisenberg:
Continuous Authentication by Keystroke Dynamics Using Committee Machines.
686-687
- Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Flexible and Scalable Access Control for Ubiquitous Computing Environments.
688-689
- Dalei Guo, Shuming Tang:
A Parallel System Strategy of Evaluation and Forecasting for Security Information with Artificial Society.
690-691
- Terrance Goan, Emi Fujioka, Ryan Kaneshiro, Lynn Gasch:
Identifying Information Provenance in Support of Intelligence Analysis, Sharing, and Protection.
692-693
- Jim Wakefield:
Intelligence Use of Unstructured Data in a Data Warehouse Environment.
694-695
Threat Detection,
Surveillance,
and Emergency Response
Infrastructure Protection and Cyber Security
- Jungan Chen:
Abnormal Detection Algorithm Based on Match Range Model.
708-710
- Emmanuel Hooper:
Experimental Validation and Analysis of an Intelligent Detection and Response Strategy to False Positives and Network Attacks.
711-714
- Jing-Xin Wang, Zhiying Wang, Kui Dai:
A PCA-LVQ Model for Intrusion Alert Analysis.
715-716
- Jian Kang, Yuan Zhang, Jiu-bin Ju:
A Formalized Taxonomy of DDoS Attacks Based on Similarity.
717-719
- Chien-Chuan Lin, Ming-Shi Wang:
Practical Intrusion Detection Using Genetic-Clustering.
720-721
- Shao-Shin Hung, Damon Shing-Min Liu:
An Ontology-Based Network Intrusion Detection System: A User-Oriented Approach.
722-723
- Byoung-Koo Kim, Young-Jun Heo, Jintae Oh:
Design and Implementation of FPGA Based High-Performance Intrusion Detection System.
724-725
- Hyun Joo Kim, Jung-Chan Na, Jong S. Jang:
Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis.
726-727
- William Eberle, Lawrence B. Holder:
Detecting Anomalies in Cargo Using Graph Properties.
728-730
- Yongsu Park, Yong Ho Song, Eul-Gyu Im:
Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks.
731-732
- Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer:
Email Worm Detection Using Naïve Bayes and Support Vector Machine.
733-734
- Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee:
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks.
735-736
- Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im:
A New Methodology of Analyzing Security Vulnerability for Network Services.
737-738
- Binod Vaidya, SangDuck Lee, Eung-Kon Kim, Seung Jo Han:
Using One-Time Password Based Authentication for Wireless IP Network.
739-740
- Taekyoung Kwon, Sang-ho Park:
Experimental Study on Wireless Sensor Network Security.
741-743
Terrorism Informatics
Emerging Applications
- Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee:
A Trust-Based Security Architecture for Ubiquitous Computing Systems.
753-754
- Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee:
A Trust Model for Uncertain Interactions in Ubiquitous Environments.
755-757
- D. Chen, Xianbin Cao, Hong Qiao, Fei-Yue Wang:
A Multiclass Classifier to Detect Pedestrians and Acquire Their Moving Styles.
758-759
- Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee:
A Home Firewall Solution for Securing Smart Spaces.
760-761
- Xinhong Zhang, Shejiao Li, Fan Zhang:
The Security Performance Evaluation of Digital Watermarking.
762-763
- Ong Song, Andrew Teoh Beng Jin, David Ngo Chek Ling:
A Novel Key Release Scheme from Biometrics.
764-765
- Olcay Kursun, Kenneth M. Reynolds, Oleg V. Favorov:
Matching Images of Never-Before-Seen Individuals in Large Law Enforcement Databases.
766-767
Copyright © Sun Mar 14 23:13:03 2010
by Michael Ley (ley@uni-trier.de)