Intelligence and Security Informatics Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Hsinchun (Επιμελητής έκδοσης), Moore, Reagan (Επιμελητής έκδοσης), Zeng, Daniel D. (Επιμελητής έκδοσης), Leavitt, John (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2004.
Σειρά:Lecture Notes in Computer Science, 3073
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05897nam a22006255i 4500
001 978-3-540-25952-7
003 DE-He213
005 20151204183852.0
007 cr nn 008mamaa
008 121227s2004 gw | s |||| 0|eng d
020 |a 9783540259527  |9 978-3-540-25952-7 
024 7 |a 10.1007/b98042  |2 doi 
040 |d GrThAP 
050 4 |a Q334-342 
050 4 |a TJ210.2-211.495 
072 7 |a UYQ  |2 bicssc 
072 7 |a TJFM1  |2 bicssc 
072 7 |a COM004000  |2 bisacsh 
082 0 4 |a 006.3  |2 23 
245 1 0 |a Intelligence and Security Informatics  |h [electronic resource] :  |b Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings /  |c edited by Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2004. 
300 |a XVI, 544 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 3073 
505 0 |a Full Papers -- Aligning Simulation Models of Smallpox Outbreaks -- Data Analytics for Bioterrorism Surveillance -- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics -- A Novel Policy and Information Flow Security Model for Active Network -- A Novel Autonomous Trust Management Model for Mobile Agents -- Privacy-Preserving Inter-database Operations -- Finding Unusual Correlation Using Matrix Decompositions -- Generating Concept Hierarchies from Text for Intelligence Analysis -- Interactive Query Languages for Intelligence Tasks -- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism -- The Architecture of the Cornell Knowledge Broker -- Computer-Based Training for Deception Detection: What Users Want? -- Identifying Multi-ID Users in Open Forums -- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training -- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats -- Critical Infrastructure Integration Modeling and Simulation -- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection -- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks -- A Tool for Internet Chatroom Surveillance -- ChatTrack: Chat Room Topic Detection Using Classification -- SECRETS: A Secure Real-Time Multimedia Surveillance System -- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information -- THEMIS: Threat Evaluation Metamodel for Information Systems -- Balancing Security and Privacy in the 21 st Century -- IT Security Risk Management under Network Effects and Layered Protection Strategy -- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations -- Analyzing and Visualizing Criminal Network Dynamics: A Case Study -- Discovering Hidden Groups in Communication Networks -- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data -- Short Papers -- Using Speech Act Profiling for Deception Detection -- Testing Various Modes of Computer-Based Training for Deception Detection -- The Use of Data Mining Techniques in Operational Crime Fighting -- Spatial Forecast Methods for Terrorist Events in Urban Environments -- Web-Based Intelligence Notification System: Architecture and Design -- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network -- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data -- Information Sharing and Collaboration Policies within Government Agencies -- Intrusion-Tolerant Intrusion Detection System -- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy -- Semantic Analysis for Monitoring Insider Threats -- Towards a Social Network Approach for Monitoring Insider Threats to Information Security -- Extended Abstracts for Posters -- Policy-Based Information Sharing with Semantics -- Determining the Gender of the Unseen Name through Hyphenation -- A Framework for a Secure Federated Patient Healthcare System -- Vulnerability Analysis and Evaluation within an Intranet -- Security Informatics: A Paradigm Shift in Information Technology Education -- Research of Characteristics of Worm Traffic -- Panel Discussion Papers -- MIPT: Sharing Terrorism Information Resources -- Post-9/11 Evolution of Al Qaeda -- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. 
650 0 |a Computer science. 
650 0 |a Operating systems (Computers). 
650 0 |a Information storage and retrieval. 
650 0 |a Artificial intelligence. 
650 0 |a Computers and civilization. 
650 0 |a Computers. 
650 0 |a Law and legislation. 
650 1 4 |a Computer Science. 
650 2 4 |a Artificial Intelligence (incl. Robotics). 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a Information Storage and Retrieval. 
650 2 4 |a Operating Systems. 
650 2 4 |a Computers and Society. 
650 2 4 |a Legal Aspects of Computing. 
700 1 |a Chen, Hsinchun.  |e editor. 
700 1 |a Moore, Reagan.  |e editor. 
700 1 |a Zeng, Daniel D.  |e editor. 
700 1 |a Leavitt, John.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540221258 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 3073 
856 4 0 |u http://dx.doi.org/10.1007/b98042  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)