Intelligence and Security Informatics First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings /

Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chen, Hsinchun (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Miranda, Richard (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Zeng, Daniel D. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Demchak, Chris (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Madhusudan, Therani (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2665
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Full Papers
  • Using Support Vector Machines for Terrorism Information Extraction
  • Criminal Incident Data Association Using the OLAP Technology
  • Names: A New Frontier in Text Mining
  • Web-Based Intelligence Reports System
  • Authorship Analysis in Cybercrime Investigation
  • Behavior Profiling of Email
  • Detecting Deception through Linguistic Analysis
  • A Longitudinal Analysis of Language Behavior of Deception in E-mail
  • Evacuation Planning: A Capacity Constrained Routing Approach
  • Locating Hidden Groups in Communication Networks Using Hidden Markov Models
  • Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department
  • Decision Based Spatial Analysis of Crime
  • CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis
  • A Spatio Temporal Visualizer for Law Enforcement
  • Tracking Hidden Groups Using Communications
  • Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study
  • "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age
  • Untangling Criminal Networks: A Case Study
  • Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework
  • Collaborative Workflow Management for Interagency Crime Analysis
  • COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
  • Active Database Systems for Monitoring and Surveillance
  • Integrated "Mixed" Networks Security Monitoring - A Proposed Framework
  • Bioterrorism Surveillance with Real-Time Data Warehousing
  • Short Papers
  • Privacy Sensitive Distributed Data Mining from Multi-party Data
  • ProGenIE: Biographical Descriptions for Intelligence Analysis
  • Scalable Knowledge Extraction from Legacy Sources with SEEK
  • "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features
  • Emergent Semantics from Users' Browsing Paths
  • Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection
  • Training Professionals to Detect Deception
  • An E-mail Monitoring System for Detecting Outflow of Confidential Documents
  • Intelligence and Security Informatics: An Information Economics Perspective
  • An International Perspective on Fighting Cybercrime
  • Extended Abstracts for Posters
  • Hiding Traversal of Tree Structured Data from Untrusted Data Stores
  • Criminal Record Matching Based on the Vector Space Model
  • Database Support for Exploring Criminal Networks
  • Hiding Data and Code Security for Application Hosting Infrastructure
  • Secure Information Sharing and Information Retrieval Infrastructure with GridIR
  • Semantic Hacking and Intelligence and Security Informatics.