|
|
|
|
| LEADER |
07372nam a2200637 4500 |
| 001 |
978-3-540-44853-2 |
| 003 |
DE-He213 |
| 005 |
20191023201216.0 |
| 007 |
cr nn 008mamaa |
| 008 |
121227s2003 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783540448532
|9 978-3-540-44853-2
|
| 024 |
7 |
|
|a 10.1007/3-540-44853-5
|2 doi
|
| 040 |
|
|
|d GrThAP
|
| 050 |
|
4 |
|a HM623
|
| 072 |
|
7 |
|a JFC
|2 bicssc
|
| 072 |
|
7 |
|a SOC026000
|2 bisacsh
|
| 072 |
|
7 |
|a JBCC
|2 thema
|
| 082 |
0 |
4 |
|a 306
|2 23
|
| 245 |
1 |
0 |
|a Intelligence and Security Informatics
|h [electronic resource] :
|b First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings /
|c edited by Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Therani Madhusudan.
|
| 250 |
|
|
|a 1st ed. 2003.
|
| 264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2003.
|
| 300 |
|
|
|a XIV, 390 p.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2665
|
| 505 |
0 |
|
|a Full Papers -- Using Support Vector Machines for Terrorism Information Extraction -- Criminal Incident Data Association Using the OLAP Technology -- Names: A New Frontier in Text Mining -- Web-Based Intelligence Reports System -- Authorship Analysis in Cybercrime Investigation -- Behavior Profiling of Email -- Detecting Deception through Linguistic Analysis -- A Longitudinal Analysis of Language Behavior of Deception in E-mail -- Evacuation Planning: A Capacity Constrained Routing Approach -- Locating Hidden Groups in Communication Networks Using Hidden Markov Models -- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department -- Decision Based Spatial Analysis of Crime -- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis -- A Spatio Temporal Visualizer for Law Enforcement -- Tracking Hidden Groups Using Communications -- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study -- "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age -- Untangling Criminal Networks: A Case Study -- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework -- Collaborative Workflow Management for Interagency Crime Analysis -- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement -- Active Database Systems for Monitoring and Surveillance -- Integrated "Mixed" Networks Security Monitoring - A Proposed Framework -- Bioterrorism Surveillance with Real-Time Data Warehousing -- Short Papers -- Privacy Sensitive Distributed Data Mining from Multi-party Data -- ProGenIE: Biographical Descriptions for Intelligence Analysis -- Scalable Knowledge Extraction from Legacy Sources with SEEK -- "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features -- Emergent Semantics from Users' Browsing Paths -- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection -- Training Professionals to Detect Deception -- An E-mail Monitoring System for Detecting Outflow of Confidential Documents -- Intelligence and Security Informatics: An Information Economics Perspective -- An International Perspective on Fighting Cybercrime -- Extended Abstracts for Posters -- Hiding Traversal of Tree Structured Data from Untrusted Data Stores -- Criminal Record Matching Based on the Vector Space Model -- Database Support for Exploring Criminal Networks -- Hiding Data and Code Security for Application Hosting Infrastructure -- Secure Information Sharing and Information Retrieval Infrastructure with GridIR -- Semantic Hacking and Intelligence and Security Informatics.
|
| 520 |
|
|
|a Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to "medical informatics" and "bioinf- matics," that there is a pressing need to develop the science of "intelligence and security informatics" - the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active "intelligence and security informatics" research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems.
|
| 650 |
|
0 |
|a Cultural studies.
|
| 650 |
|
0 |
|a Data encryption (Computer science).
|
| 650 |
|
0 |
|a Application software.
|
| 650 |
|
0 |
|a Computer communication systems.
|
| 650 |
|
0 |
|a Database management.
|
| 650 |
|
0 |
|a Information storage and retrieval.
|
| 650 |
1 |
4 |
|a Cultural Studies.
|0 http://scigraph.springernature.com/things/product-market-codes/X22040
|
| 650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
| 650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
| 650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
| 650 |
2 |
4 |
|a Database Management.
|0 http://scigraph.springernature.com/things/product-market-codes/I18024
|
| 650 |
2 |
4 |
|a Information Storage and Retrieval.
|0 http://scigraph.springernature.com/things/product-market-codes/I18032
|
| 700 |
1 |
|
|a Chen, Hsinchun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Miranda, Richard.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Zeng, Daniel D.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Demchak, Chris.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Madhusudan, Therani.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783662179116
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783540401896
|
| 830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 2665
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/3-540-44853-5
|z Full Text via HEAL-Link
|
| 912 |
|
|
|a ZDB-2-SCS
|
| 912 |
|
|
|a ZDB-2-LNC
|
| 912 |
|
|
|a ZDB-2-BAE
|
| 950 |
|
|
|a Computer Science (Springer-11645)
|