Intelligence and Security Informatics Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Hsinchun (Επιμελητής έκδοσης), Moore, Reagan (Επιμελητής έκδοσης), Zeng, Daniel D. (Επιμελητής έκδοσης), Leavitt, John (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2004.
Σειρά:Lecture Notes in Computer Science, 3073
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Full Papers
  • Aligning Simulation Models of Smallpox Outbreaks
  • Data Analytics for Bioterrorism Surveillance
  • West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
  • A Novel Policy and Information Flow Security Model for Active Network
  • A Novel Autonomous Trust Management Model for Mobile Agents
  • Privacy-Preserving Inter-database Operations
  • Finding Unusual Correlation Using Matrix Decompositions
  • Generating Concept Hierarchies from Text for Intelligence Analysis
  • Interactive Query Languages for Intelligence Tasks
  • Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
  • The Architecture of the Cornell Knowledge Broker
  • Computer-Based Training for Deception Detection: What Users Want?
  • Identifying Multi-ID Users in Open Forums
  • Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training
  • Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
  • Critical Infrastructure Integration Modeling and Simulation
  • Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection
  • The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks
  • A Tool for Internet Chatroom Surveillance
  • ChatTrack: Chat Room Topic Detection Using Classification
  • SECRETS: A Secure Real-Time Multimedia Surveillance System
  • Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
  • THEMIS: Threat Evaluation Metamodel for Information Systems
  • Balancing Security and Privacy in the 21 st Century
  • IT Security Risk Management under Network Effects and Layered Protection Strategy
  • Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations
  • Analyzing and Visualizing Criminal Network Dynamics: A Case Study
  • Discovering Hidden Groups in Communication Networks
  • Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data
  • Short Papers
  • Using Speech Act Profiling for Deception Detection
  • Testing Various Modes of Computer-Based Training for Deception Detection
  • The Use of Data Mining Techniques in Operational Crime Fighting
  • Spatial Forecast Methods for Terrorist Events in Urban Environments
  • Web-Based Intelligence Notification System: Architecture and Design
  • Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network
  • Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data
  • Information Sharing and Collaboration Policies within Government Agencies
  • Intrusion-Tolerant Intrusion Detection System
  • Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy
  • Semantic Analysis for Monitoring Insider Threats
  • Towards a Social Network Approach for Monitoring Insider Threats to Information Security
  • Extended Abstracts for Posters
  • Policy-Based Information Sharing with Semantics
  • Determining the Gender of the Unseen Name through Hyphenation
  • A Framework for a Secure Federated Patient Healthcare System
  • Vulnerability Analysis and Evaluation within an Intranet
  • Security Informatics: A Paradigm Shift in Information Technology Education
  • Research of Characteristics of Worm Traffic
  • Panel Discussion Papers
  • MIPT: Sharing Terrorism Information Resources
  • Post-9/11 Evolution of Al Qaeda
  • Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism.