Intelligence and Security Informatics First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings /
Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security. As one of the original founding mandates of the National Science Foundation, mid- to long-term national security research in...
| Συγγραφή απο Οργανισμό/Αρχή: | |
|---|---|
| Άλλοι συγγραφείς: | , , , , |
| Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
| Γλώσσα: | English |
| Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
| Έκδοση: | 1st ed. 2003. |
| Σειρά: | Lecture Notes in Computer Science,
2665 |
| Θέματα: | |
| Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Full Papers
- Using Support Vector Machines for Terrorism Information Extraction
- Criminal Incident Data Association Using the OLAP Technology
- Names: A New Frontier in Text Mining
- Web-Based Intelligence Reports System
- Authorship Analysis in Cybercrime Investigation
- Behavior Profiling of Email
- Detecting Deception through Linguistic Analysis
- A Longitudinal Analysis of Language Behavior of Deception in E-mail
- Evacuation Planning: A Capacity Constrained Routing Approach
- Locating Hidden Groups in Communication Networks Using Hidden Markov Models
- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department
- Decision Based Spatial Analysis of Crime
- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis
- A Spatio Temporal Visualizer for Law Enforcement
- Tracking Hidden Groups Using Communications
- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study
- "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age
- Untangling Criminal Networks: A Case Study
- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework
- Collaborative Workflow Management for Interagency Crime Analysis
- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement
- Active Database Systems for Monitoring and Surveillance
- Integrated "Mixed" Networks Security Monitoring - A Proposed Framework
- Bioterrorism Surveillance with Real-Time Data Warehousing
- Short Papers
- Privacy Sensitive Distributed Data Mining from Multi-party Data
- ProGenIE: Biographical Descriptions for Intelligence Analysis
- Scalable Knowledge Extraction from Legacy Sources with SEEK
- "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features
- Emergent Semantics from Users' Browsing Paths
- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection
- Training Professionals to Detect Deception
- An E-mail Monitoring System for Detecting Outflow of Confidential Documents
- Intelligence and Security Informatics: An Information Economics Perspective
- An International Perspective on Fighting Cybercrime
- Extended Abstracts for Posters
- Hiding Traversal of Tree Structured Data from Untrusted Data Stores
- Criminal Record Matching Based on the Vector Space Model
- Database Support for Exploring Criminal Networks
- Hiding Data and Code Security for Application Hosting Infrastructure
- Secure Information Sharing and Information Retrieval Infrastructure with GridIR
- Semantic Hacking and Intelligence and Security Informatics.