Intelligence and Security Informatics Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2004.
|
Σειρά: | Lecture Notes in Computer Science,
3073 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Full Papers
- Aligning Simulation Models of Smallpox Outbreaks
- Data Analytics for Bioterrorism Surveillance
- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
- A Novel Policy and Information Flow Security Model for Active Network
- A Novel Autonomous Trust Management Model for Mobile Agents
- Privacy-Preserving Inter-database Operations
- Finding Unusual Correlation Using Matrix Decompositions
- Generating Concept Hierarchies from Text for Intelligence Analysis
- Interactive Query Languages for Intelligence Tasks
- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
- The Architecture of the Cornell Knowledge Broker
- Computer-Based Training for Deception Detection: What Users Want?
- Identifying Multi-ID Users in Open Forums
- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training
- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
- Critical Infrastructure Integration Modeling and Simulation
- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection
- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks
- A Tool for Internet Chatroom Surveillance
- ChatTrack: Chat Room Topic Detection Using Classification
- SECRETS: A Secure Real-Time Multimedia Surveillance System
- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
- THEMIS: Threat Evaluation Metamodel for Information Systems
- Balancing Security and Privacy in the 21 st Century
- IT Security Risk Management under Network Effects and Layered Protection Strategy
- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations
- Analyzing and Visualizing Criminal Network Dynamics: A Case Study
- Discovering Hidden Groups in Communication Networks
- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data
- Short Papers
- Using Speech Act Profiling for Deception Detection
- Testing Various Modes of Computer-Based Training for Deception Detection
- The Use of Data Mining Techniques in Operational Crime Fighting
- Spatial Forecast Methods for Terrorist Events in Urban Environments
- Web-Based Intelligence Notification System: Architecture and Design
- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network
- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data
- Information Sharing and Collaboration Policies within Government Agencies
- Intrusion-Tolerant Intrusion Detection System
- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy
- Semantic Analysis for Monitoring Insider Threats
- Towards a Social Network Approach for Monitoring Insider Threats to Information Security
- Extended Abstracts for Posters
- Policy-Based Information Sharing with Semantics
- Determining the Gender of the Unseen Name through Hyphenation
- A Framework for a Secure Federated Patient Healthcare System
- Vulnerability Analysis and Evaluation within an Intranet
- Security Informatics: A Paradigm Shift in Information Technology Education
- Research of Characteristics of Worm Traffic
- Panel Discussion Papers
- MIPT: Sharing Terrorism Information Resources
- Post-9/11 Evolution of Al Qaeda
- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism.