Intelligence and Security Informatics First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings /

Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Hsinchun (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Miranda, Richard (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Zeng, Daniel D. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Demchak, Chris (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Madhusudan, Therani (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2665
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 07372nam a2200637 4500
001 978-3-540-44853-2
003 DE-He213
005 20191023201216.0
007 cr nn 008mamaa
008 121227s2003 gw | s |||| 0|eng d
020 |a 9783540448532  |9 978-3-540-44853-2 
024 7 |a 10.1007/3-540-44853-5  |2 doi 
040 |d GrThAP 
050 4 |a HM623 
072 7 |a JFC  |2 bicssc 
072 7 |a SOC026000  |2 bisacsh 
072 7 |a JBCC  |2 thema 
082 0 4 |a 306  |2 23 
245 1 0 |a Intelligence and Security Informatics  |h [electronic resource] :  |b First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings /  |c edited by Hsinchun Chen, Richard Miranda, Daniel D. Zeng, Chris Demchak, Therani Madhusudan. 
250 |a 1st ed. 2003. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2003. 
300 |a XIV, 390 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2665 
505 0 |a Full Papers -- Using Support Vector Machines for Terrorism Information Extraction -- Criminal Incident Data Association Using the OLAP Technology -- Names: A New Frontier in Text Mining -- Web-Based Intelligence Reports System -- Authorship Analysis in Cybercrime Investigation -- Behavior Profiling of Email -- Detecting Deception through Linguistic Analysis -- A Longitudinal Analysis of Language Behavior of Deception in E-mail -- Evacuation Planning: A Capacity Constrained Routing Approach -- Locating Hidden Groups in Communication Networks Using Hidden Markov Models -- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department -- Decision Based Spatial Analysis of Crime -- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis -- A Spatio Temporal Visualizer for Law Enforcement -- Tracking Hidden Groups Using Communications -- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study -- "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age -- Untangling Criminal Networks: A Case Study -- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework -- Collaborative Workflow Management for Interagency Crime Analysis -- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement -- Active Database Systems for Monitoring and Surveillance -- Integrated "Mixed" Networks Security Monitoring - A Proposed Framework -- Bioterrorism Surveillance with Real-Time Data Warehousing -- Short Papers -- Privacy Sensitive Distributed Data Mining from Multi-party Data -- ProGenIE: Biographical Descriptions for Intelligence Analysis -- Scalable Knowledge Extraction from Legacy Sources with SEEK -- "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features -- Emergent Semantics from Users' Browsing Paths -- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection -- Training Professionals to Detect Deception -- An E-mail Monitoring System for Detecting Outflow of Confidential Documents -- Intelligence and Security Informatics: An Information Economics Perspective -- An International Perspective on Fighting Cybercrime -- Extended Abstracts for Posters -- Hiding Traversal of Tree Structured Data from Untrusted Data Stores -- Criminal Record Matching Based on the Vector Space Model -- Database Support for Exploring Criminal Networks -- Hiding Data and Code Security for Application Hosting Infrastructure -- Secure Information Sharing and Information Retrieval Infrastructure with GridIR -- Semantic Hacking and Intelligence and Security Informatics. 
520 |a Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in the areas of inf- mation technologies, organizational studies, and security-related public policy is critically needed. In a way similar to how medical and biological research has faced signi?cant information overload and yet also tremendous opportunities for new inno- tion, law enforcement, criminal analysis, and intelligence communities are facing the same challenge. We believe, similar to "medical informatics" and "bioinf- matics," that there is a pressing need to develop the science of "intelligence and security informatics" - the study of the use and development of advanced information technologies, systems, algorithms and databases for national se- rity related applications,through an integrated technological,organizational,and policy-based approach. We believe active "intelligence and security informatics" research will help improve knowledge discovery and dissemination and enhance information s- ring and collaboration across law enforcement communities and among aca- mics, local, state, and federal agencies, and industry. Many existing computer and information science techniques need to be reexamined and adapted for - tional security applications. New insights from this unique domain could result in signi?cant breakthroughs in new data mining, visualization, knowledge - nagement, and information security techniques and systems. 
650 0 |a Cultural studies. 
650 0 |a Data encryption (Computer science). 
650 0 |a Application software. 
650 0 |a Computer communication systems. 
650 0 |a Database management. 
650 0 |a Information storage and retrieval. 
650 1 4 |a Cultural Studies.  |0 http://scigraph.springernature.com/things/product-market-codes/X22040 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Information Systems Applications (incl. Internet).  |0 http://scigraph.springernature.com/things/product-market-codes/I18040 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Database Management.  |0 http://scigraph.springernature.com/things/product-market-codes/I18024 
650 2 4 |a Information Storage and Retrieval.  |0 http://scigraph.springernature.com/things/product-market-codes/I18032 
700 1 |a Chen, Hsinchun.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Miranda, Richard.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Zeng, Daniel D.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Demchak, Chris.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Madhusudan, Therani.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662179116 
776 0 8 |i Printed edition:  |z 9783540401896 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2665 
856 4 0 |u https://doi.org/10.1007/3-540-44853-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)