Online Library TheLib.net » Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).




This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005.

The 28 revised full papers, 34 revised short papers, and 32 poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data and text mining, infrastructure protection and emergency response, information management and security education, deception detection and authorship analysis, monitoring and surveillance, and terrorism informatics.




This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005.

The 28 revised full papers, 34 revised short papers, and 32 poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data and text mining, infrastructure protection and emergency response, information management and security education, deception detection and authorship analysis, monitoring and surveillance, and terrorism informatics.


Content:
Front Matter....Pages -
Collusion Set Detection Through Outlier Discovery....Pages 1-13
Digging in the Details: A Case Study in Network Data Mining....Pages 14-26
Efficient Identification of Overlapping Communities....Pages 27-36
Event-Driven Document Selection for Terrorism Information Extraction....Pages 37-48
Link Analysis Tools for Intelligence and Counterterrorism....Pages 49-59
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature....Pages 60-71
Private Mining of Association Rules....Pages 72-80
Design Principles of Coordinated Multi-incident Emergency Response Systems....Pages 81-98
Multi-modal Biometrics with PKI Technologies for Border Control Applications....Pages 99-114
Risk Management Using Behavior Based Bayesian Networks....Pages 115-126
Sensitivity Analysis of an Attack Containment Model....Pages 127-138
Toward a Target-Specific Method of Threat Assessment....Pages 139-152
Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts....Pages 153-170
Integrating Private Databases for Data Analysis....Pages 171-182
Applying Authorship Analysis to Arabic Web Content....Pages 183-197
Automatic Extraction of Deceptive Behavioral Cues from Video....Pages 198-208
Automatically Determining an Anonymous Author’s Native Language....Pages 209-217
A Cognitive Model for Alert Correlation in a Distributed Environment....Pages 218-230
Beyond Keyword Filtering for Message and Conversation Detection....Pages 231-243
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)....Pages 244-255
Modeling and Multiway Analysis of Chatroom Tensors....Pages 256-268
Selective Fusion for Speaker Verification in Surveillance....Pages 269-279
A New Conceptual Framework to Resolve Terrorism’s Root Causes....Pages 280-286
Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network....Pages 287-304
A Conceptual Model of Counterterrorist Operations....Pages 305-315
Measuring Success in Countering Terrorism: Problems and Pitfalls....Pages 316-321
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis....Pages 322-339
Testing a Rational Choice Model of Airline Hijackings....Pages 340-361
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms....Pages 362-367
Discovering Identity Problems: A Case Study....Pages 368-373
Efficient Discovery of New Information in Large Text Databases....Pages 374-380
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content....Pages 381-388
LSI-Based Taxonomy Generation: The Taxonomist System....Pages 389-394
Some Marginal Learning Algorithms for Unsupervised Problems ....Pages 395-401
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites....Pages 402-411
Evaluating an Infectious Disease Information Sharing and Analysis System....Pages 412-417
How Question Answering Technology Helps to Locate Malevolent Online Content....Pages 418-421
Information Supply Chain: A Unified Framework for Information-Sharing....Pages 422-428
Map-Mediated GeoCollaborative Crisis Management....Pages 429-435
Thematic Indicators Derived from World News Reports....Pages 436-447
A Novel Watermarking Algorithm Based on SVD and Zernike Moments....Pages 448-453
A Survey of Software Watermarking....Pages 454-458
Data Distortion for Privacy Protection in a Terrorist Analysis System....Pages 459-464
Deception Across Cultures: Bottom-Up and Top-Down Approaches....Pages 465-470
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling....Pages 471-478
Active Automation of the DITSCAP....Pages 479-485
An Ontological Approach to the Document Access Problem of Insider Threat....Pages 486-491
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall....Pages 492-497
Intrusion Detection System Using Sequence and Set Preserving Metric....Pages 498-504
The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level....Pages 505-510
Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation....Pages 511-516
A Jackson Network-Based Model for Quantitative Analysis of Network Security....Pages 517-522
Biomonitoring, Phylogenetics and Anomaly Aggregation Systems....Pages 523-529
CODESSEAL: Compiler/FPGA Approach to Secure Applications....Pages 530-535
Computational Tool in Infrastructure Emergency Total Evacuation Analysis....Pages 536-542
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security....Pages 543-548
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems....Pages 549-553
Connections in the World of International Terrorism....Pages 554-560
Forecasting Terrorism: Indicators and Proven Analytic Techniques....Pages 561-566
Forecasting Terrorist Groups’ Warfare: ‘Conventional’ to CBRN....Pages 567-570
The Qualitative Challenge of Insurgency Informatics....Pages 571-578
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events....Pages 579-589
A Group Decision-Support Method for Search and Rescue Based on Markov Chain....Pages 590-592
A New Relationship Form in Data Mining....Pages 593-594
A Study of ”Root Causes of Conflict” Using Latent Semantic Analysis....Pages 595-596
An Empirical Study on Dynamic Effects on Deception Detection....Pages 597-599
Anti Money Laundering Reporting and Investigation – Sorting the Wheat from the Chaff....Pages 600-601
Application of Latent Semantic Indexing to Processing of Noisy Text....Pages 602-603
Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques....Pages 604-605
Mining Schemas in Semistructured Data Using Fuzzy Decision Trees....Pages 606-607
More Than a Summary: Stance-Shift Analysis....Pages 608-609
Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots....Pages 610-611
BioPortal: Sharing and Analyzing Infectious Disease Information....Pages 612-613
DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information....Pages 614-616
Processing High-Speed Intelligence Feeds in Real-Time....Pages 617-618
Question Answer TARA: A Terrorism Activity Resource Application....Pages 619-620
Template Based Semantic Similarity for Security Applications....Pages 621-622
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web....Pages 623-624
Toward an ITS Specific Knowledge Engine....Pages 625-626
A Blind Image Watermarking Using for Copyright Protection and Tracing....Pages 627-628
Towards an Effective Wireless Security Policy for Sensitive Organizations....Pages 629-630
A Taxonomy of Cyber Attacks on 3G Networks....Pages 631-633
An Adaptive Approach to Handle DoS Attack for Web Services....Pages 634-635
An Architecture for Network Security Using Feedback Control....Pages 636-637
Defending a Web Browser Against Spying with Browser Helper Objects....Pages 638-639
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet....Pages 640-641
Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel....Pages 642-643
Gathering Digital Evidence in Response to Information Security Incidents....Pages 644-645
On the QP Algorithm in Software Watermarking....Pages 646-647
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation....Pages 648-649
Secure Contents Distribution Using Flash Memory Technology....Pages 650-651
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities....Pages 652-653
Securing Grid-Based Critical Infrastructures....Pages 654-655
The Safety Alliance of Cushing – A Model Example of Cooperation as an Effective Counterterrorism Tool....Pages 656-657
A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques....Pages 658-659
An Agent-Based Framework for a Traffic Security Management System....Pages 660-661
Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle....Pages 662-663
Application of Cooperative Co-evolution in Pedestrian Detection Systems....Pages 664-665
Biometric Fingerprints Based Radio Frequency Identification....Pages 666-668
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization....Pages 669-670
Back Matter....Pages -


This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005.

The 28 revised full papers, 34 revised short papers, and 32 poster abstracts presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data and text mining, infrastructure protection and emergency response, information management and security education, deception detection and authorship analysis, monitoring and surveillance, and terrorism informatics.


Content:
Front Matter....Pages -
Collusion Set Detection Through Outlier Discovery....Pages 1-13
Digging in the Details: A Case Study in Network Data Mining....Pages 14-26
Efficient Identification of Overlapping Communities....Pages 27-36
Event-Driven Document Selection for Terrorism Information Extraction....Pages 37-48
Link Analysis Tools for Intelligence and Counterterrorism....Pages 49-59
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature....Pages 60-71
Private Mining of Association Rules....Pages 72-80
Design Principles of Coordinated Multi-incident Emergency Response Systems....Pages 81-98
Multi-modal Biometrics with PKI Technologies for Border Control Applications....Pages 99-114
Risk Management Using Behavior Based Bayesian Networks....Pages 115-126
Sensitivity Analysis of an Attack Containment Model....Pages 127-138
Toward a Target-Specific Method of Threat Assessment....Pages 139-152
Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts....Pages 153-170
Integrating Private Databases for Data Analysis....Pages 171-182
Applying Authorship Analysis to Arabic Web Content....Pages 183-197
Automatic Extraction of Deceptive Behavioral Cues from Video....Pages 198-208
Automatically Determining an Anonymous Author’s Native Language....Pages 209-217
A Cognitive Model for Alert Correlation in a Distributed Environment....Pages 218-230
Beyond Keyword Filtering for Message and Conversation Detection....Pages 231-243
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)....Pages 244-255
Modeling and Multiway Analysis of Chatroom Tensors....Pages 256-268
Selective Fusion for Speaker Verification in Surveillance....Pages 269-279
A New Conceptual Framework to Resolve Terrorism’s Root Causes....Pages 280-286
Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network....Pages 287-304
A Conceptual Model of Counterterrorist Operations....Pages 305-315
Measuring Success in Countering Terrorism: Problems and Pitfalls....Pages 316-321
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis....Pages 322-339
Testing a Rational Choice Model of Airline Hijackings....Pages 340-361
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms....Pages 362-367
Discovering Identity Problems: A Case Study....Pages 368-373
Efficient Discovery of New Information in Large Text Databases....Pages 374-380
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content....Pages 381-388
LSI-Based Taxonomy Generation: The Taxonomist System....Pages 389-394
Some Marginal Learning Algorithms for Unsupervised Problems ....Pages 395-401
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites....Pages 402-411
Evaluating an Infectious Disease Information Sharing and Analysis System....Pages 412-417
How Question Answering Technology Helps to Locate Malevolent Online Content....Pages 418-421
Information Supply Chain: A Unified Framework for Information-Sharing....Pages 422-428
Map-Mediated GeoCollaborative Crisis Management....Pages 429-435
Thematic Indicators Derived from World News Reports....Pages 436-447
A Novel Watermarking Algorithm Based on SVD and Zernike Moments....Pages 448-453
A Survey of Software Watermarking....Pages 454-458
Data Distortion for Privacy Protection in a Terrorist Analysis System....Pages 459-464
Deception Across Cultures: Bottom-Up and Top-Down Approaches....Pages 465-470
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling....Pages 471-478
Active Automation of the DITSCAP....Pages 479-485
An Ontological Approach to the Document Access Problem of Insider Threat....Pages 486-491
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall....Pages 492-497
Intrusion Detection System Using Sequence and Set Preserving Metric....Pages 498-504
The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level....Pages 505-510
Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation....Pages 511-516
A Jackson Network-Based Model for Quantitative Analysis of Network Security....Pages 517-522
Biomonitoring, Phylogenetics and Anomaly Aggregation Systems....Pages 523-529
CODESSEAL: Compiler/FPGA Approach to Secure Applications....Pages 530-535
Computational Tool in Infrastructure Emergency Total Evacuation Analysis....Pages 536-542
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security....Pages 543-548
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems....Pages 549-553
Connections in the World of International Terrorism....Pages 554-560
Forecasting Terrorism: Indicators and Proven Analytic Techniques....Pages 561-566
Forecasting Terrorist Groups’ Warfare: ‘Conventional’ to CBRN....Pages 567-570
The Qualitative Challenge of Insurgency Informatics....Pages 571-578
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events....Pages 579-589
A Group Decision-Support Method for Search and Rescue Based on Markov Chain....Pages 590-592
A New Relationship Form in Data Mining....Pages 593-594
A Study of ”Root Causes of Conflict” Using Latent Semantic Analysis....Pages 595-596
An Empirical Study on Dynamic Effects on Deception Detection....Pages 597-599
Anti Money Laundering Reporting and Investigation – Sorting the Wheat from the Chaff....Pages 600-601
Application of Latent Semantic Indexing to Processing of Noisy Text....Pages 602-603
Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques....Pages 604-605
Mining Schemas in Semistructured Data Using Fuzzy Decision Trees....Pages 606-607
More Than a Summary: Stance-Shift Analysis....Pages 608-609
Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots....Pages 610-611
BioPortal: Sharing and Analyzing Infectious Disease Information....Pages 612-613
DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information....Pages 614-616
Processing High-Speed Intelligence Feeds in Real-Time....Pages 617-618
Question Answer TARA: A Terrorism Activity Resource Application....Pages 619-620
Template Based Semantic Similarity for Security Applications....Pages 621-622
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web....Pages 623-624
Toward an ITS Specific Knowledge Engine....Pages 625-626
A Blind Image Watermarking Using for Copyright Protection and Tracing....Pages 627-628
Towards an Effective Wireless Security Policy for Sensitive Organizations....Pages 629-630
A Taxonomy of Cyber Attacks on 3G Networks....Pages 631-633
An Adaptive Approach to Handle DoS Attack for Web Services....Pages 634-635
An Architecture for Network Security Using Feedback Control....Pages 636-637
Defending a Web Browser Against Spying with Browser Helper Objects....Pages 638-639
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet....Pages 640-641
Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel....Pages 642-643
Gathering Digital Evidence in Response to Information Security Incidents....Pages 644-645
On the QP Algorithm in Software Watermarking....Pages 646-647
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation....Pages 648-649
Secure Contents Distribution Using Flash Memory Technology....Pages 650-651
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities....Pages 652-653
Securing Grid-Based Critical Infrastructures....Pages 654-655
The Safety Alliance of Cushing – A Model Example of Cooperation as an Effective Counterterrorism Tool....Pages 656-657
A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques....Pages 658-659
An Agent-Based Framework for a Traffic Security Management System....Pages 660-661
Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle....Pages 662-663
Application of Cooperative Co-evolution in Pedestrian Detection Systems....Pages 664-665
Biometric Fingerprints Based Radio Frequency Identification....Pages 666-668
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization....Pages 669-670
Back Matter....Pages -
....
Download the book Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Related books
Comments (0)
reload, if the code cannot be seen