Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings /

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Hsinchun (Επιμελητής έκδοσης), Wang, Fei-Yue (Επιμελητής έκδοσης), Yang, Christopher C. (Επιμελητής έκδοσης), Zeng, Daniel (Επιμελητής έκδοσης), Chau, Michael (Επιμελητής έκδοσης), Chang, Kuiyu (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 3917
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Keynote Speech
  • Data Mining for Security Applications
  • Web and Text Mining for Terrorism Informatics
  • Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity
  • Multi-lingual Detection of Terrorist Content on the Web
  • INEXT: An Investigative Search Tool for Knowledge Extraction
  • Cybercrime Analysis
  • Cybercrime in Taiwan – An Analysis of Suspect Records
  • Analysis of Computer Crime Characteristics in Taiwan
  • A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination
  • Network Security
  • Detecting Novel Network Attacks with a Data Field
  • Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication
  • Illegal Intrusion Detection Based on Hidden Information Database
  • Defender Personality Traits
  • Crime Data Mining
  • Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database
  • Country Corruption Analysis with Self Organizing Maps and Support Vector Machines
  • Temporal Representation in Spike Detection of Sparse Personal Identity Streams
  • Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots
  • VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming
  • Posters
  • Integration of a Cryptographic File System and Access Control
  • Applications of Homomorphic Functions to Software Obfuscation
  • Security Model for Informational Privacy
  • A Viable System for Tracing Illegal Users of Video
  • Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution
  • The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication
  • Cascade Damage Estimation Model for Internet Attacks
  • A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting
  • A Fuzzy Anomaly Detection System
  • Hidden Markov Model Based Intrusion Detection
  • One-Class Strategies for Security Information Detection
  • Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks
  • A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification
  • Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks
  • Analysis of Infectious Disease Data Based on Evolutionary Computation
  • Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis
  • A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.