Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings /

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Chen, Hsinchun (Editor), Wang, Fei-Yue (Editor), Yang, Christopher C. (Editor), Zeng, Daniel (Editor), Chau, Michael (Editor), Chang, Kuiyu (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Series:Lecture Notes in Computer Science, 3917
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Keynote Speech
  • Data Mining for Security Applications
  • Web and Text Mining for Terrorism Informatics
  • Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity
  • Multi-lingual Detection of Terrorist Content on the Web
  • INEXT: An Investigative Search Tool for Knowledge Extraction
  • Cybercrime Analysis
  • Cybercrime in Taiwan – An Analysis of Suspect Records
  • Analysis of Computer Crime Characteristics in Taiwan
  • A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination
  • Network Security
  • Detecting Novel Network Attacks with a Data Field
  • Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication
  • Illegal Intrusion Detection Based on Hidden Information Database
  • Defender Personality Traits
  • Crime Data Mining
  • Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database
  • Country Corruption Analysis with Self Organizing Maps and Support Vector Machines
  • Temporal Representation in Spike Detection of Sparse Personal Identity Streams
  • Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots
  • VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming
  • Posters
  • Integration of a Cryptographic File System and Access Control
  • Applications of Homomorphic Functions to Software Obfuscation
  • Security Model for Informational Privacy
  • A Viable System for Tracing Illegal Users of Video
  • Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution
  • The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication
  • Cascade Damage Estimation Model for Internet Attacks
  • A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting
  • A Fuzzy Anomaly Detection System
  • Hidden Markov Model Based Intrusion Detection
  • One-Class Strategies for Security Information Detection
  • Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks
  • A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification
  • Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks
  • Analysis of Infectious Disease Data Based on Evolutionary Computation
  • Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis
  • A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.