Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings /
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
3917 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Keynote Speech
- Data Mining for Security Applications
- Web and Text Mining for Terrorism Informatics
- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity
- Multi-lingual Detection of Terrorist Content on the Web
- INEXT: An Investigative Search Tool for Knowledge Extraction
- Cybercrime Analysis
- Cybercrime in Taiwan – An Analysis of Suspect Records
- Analysis of Computer Crime Characteristics in Taiwan
- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination
- Network Security
- Detecting Novel Network Attacks with a Data Field
- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication
- Illegal Intrusion Detection Based on Hidden Information Database
- Defender Personality Traits
- Crime Data Mining
- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database
- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines
- Temporal Representation in Spike Detection of Sparse Personal Identity Streams
- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots
- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming
- Posters
- Integration of a Cryptographic File System and Access Control
- Applications of Homomorphic Functions to Software Obfuscation
- Security Model for Informational Privacy
- A Viable System for Tracing Illegal Users of Video
- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution
- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication
- Cascade Damage Estimation Model for Internet Attacks
- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting
- A Fuzzy Anomaly Detection System
- Hidden Markov Model Based Intrusion Detection
- One-Class Strategies for Security Information Detection
- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks
- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification
- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks
- Analysis of Infectious Disease Data Based on Evolutionary Computation
- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis
- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.