Online Library TheLib.net » Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

This book constitutes the refereed proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, held in Tucson, AZ, USA in June 2004.

The 29 revised full papers and 12 revised short papers presented together with 6 extended abstracts of posters and 3 panel discussion summaries were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on bioterrorism and disease informatics; data access, privacy, and trust management; data management and mining; deception detection; information assurance and infrastructure protection; monitoring and surveillance; security policies and evaluation; and social network analysis.




This book constitutes the refereed proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, held in Tucson, AZ, USA in June 2004.

The 29 revised full papers and 12 revised short papers presented together with 6 extended abstracts of posters and 3 panel discussion summaries were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on bioterrorism and disease informatics; data access, privacy, and trust management; data management and mining; deception detection; information assurance and infrastructure protection; monitoring and surveillance; security policies and evaluation; and social network analysis.


Content:
Front Matter....Pages -
Aligning Simulation Models of Smallpox Outbreaks....Pages 1-16
Data Analytics for Bioterrorism Surveillance....Pages 17-27
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics....Pages 28-41
A Novel Policy and Information Flow Security Model for Active Network....Pages 42-55
A Novel Autonomous Trust Management Model for Mobile Agents....Pages 56-65
Privacy-Preserving Inter-database Operations....Pages 66-82
Finding Unusual Correlation Using Matrix Decompositions....Pages 83-99
Generating Concept Hierarchies from Text for Intelligence Analysis....Pages 100-113
Interactive Query Languages for Intelligence Tasks....Pages 114-124
Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism....Pages 125-145
The Architecture of the Cornell Knowledge Broker....Pages 146-162
Computer-Based Training for Deception Detection: What Users Want?....Pages 163-175
Identifying Multi-ID Users in Open Forums....Pages 176-186
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training....Pages 187-200
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats....Pages 201-213
Critical Infrastructure Integration Modeling and Simulation....Pages 214-225
Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection....Pages 226-238
The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks....Pages 239-251
A Tool for Internet Chatroom Surveillance....Pages 252-265
ChatTrack: Chat Room Topic Detection Using Classification....Pages 266-277
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information....Pages 278-296
THEMIS: Threat Evaluation Metamodel for Information Systems....Pages 297-306
IT Security Risk Management under Network Effects and Layered Protection Strategy....Pages 307-321
Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations....Pages 322-330
Analyzing and Visualizing Criminal Network Dynamics: A Case Study....Pages 331-348
Discovering Hidden Groups in Communication Networks....Pages 349-358
Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data....Pages 359-377
Using Speech Act Profiling for Deception Detection....Pages 378-389
Testing Various Modes of Computer-Based Training for Deception Detection....Pages 390-402
The Use of Data Mining Techniques in Operational Crime Fighting....Pages 403-410
Spatial Forecast Methods for Terrorist Events in Urban Environments....Pages 411-417
Web-Based Intelligence Notification System: Architecture and Design....Pages 418-425
Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network....Pages 426-435
Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data....Pages 436-448
Information Sharing and Collaboration Policies within Government Agencies....Pages 449-456
Intrusion-Tolerant Intrusion Detection System....Pages 457-466
Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy....Pages 467-475
Semantic Analysis for Monitoring Insider Threats....Pages 476-483
Towards a Social Network Approach for Monitoring Insider Threats to Information Security....Pages 484-491
Policy-Based Information Sharing with Semantics....Pages 492-500
Determining the Gender of the Unseen Name through Hyphenation....Pages 501-507
A Framework for a Secure Federated Patient Healthcare System....Pages 508-509
Vulnerability Analysis and Evaluation within an Intranet....Pages 510-511
Security Informatics: A Paradigm Shift in Information Technology Education....Pages 512-513
Research of Characteristics of Worm Traffic....Pages 514-515
MIPT: Sharing Terrorism Information Resources....Pages 516-517
Post-9/11 Evolution of Al Qaeda....Pages 518-519
Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism....Pages 520-525
Back Matter....Pages 526-530
....Pages 531-533
Download the book Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen