Online Library TheLib.net » Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception detection, terrorist and criminal social network analysis, crime analysis, monitoring and surveillance, policy studies and evaluation, and information assurance, among others. We continued these stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI 2006) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). WISI 2006 provided a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. WISI 2006 was hosted by the Chinese University of Hong Kong, the University of Arizona, the Nanyang Technological University, and the Chinese Academy of Sciences. The one-day program included one keynote speech, four refereed paper sessions, two invited sessions and a poster reception.




This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006).

The 32 revised full papers presented together with the abstract of the keynote talk were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.




This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006).

The 32 revised full papers presented together with the abstract of the keynote talk were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.


Content:
Front Matter....Pages -
Data Mining for Security Applications....Pages 1-3
Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity....Pages 4-15
Multi-lingual Detection of Terrorist Content on the Web....Pages 16-30
INEXT: An Investigative Search Tool for Knowledge Extraction....Pages 31-37
Cybercrime in Taiwan – An Analysis of Suspect Records....Pages 38-48
Analysis of Computer Crime Characteristics in Taiwan....Pages 49-57
A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination....Pages 58-65
Detecting Novel Network Attacks with a Data Field....Pages 66-72
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication....Pages 73-78
Illegal Intrusion Detection Based on Hidden Information Database....Pages 79-84
Defender Personality Traits....Pages 85-90
Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database....Pages 91-102
Country Corruption Analysis with Self Organizing Maps and Support Vector Machines....Pages 103-114
Temporal Representation in Spike Detection of Sparse Personal Identity Streams....Pages 115-126
Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots....Pages 127-132
VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming....Pages 133-138
Integration of a Cryptographic File System and Access Control....Pages 139-151
Applications of Homomorphic Functions to Software Obfuscation....Pages 152-153
Security Model for Informational Privacy....Pages 154-155
A Viable System for Tracing Illegal Users of Video....Pages 156-158
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution....Pages 159-160
The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication....Pages 161-162
Cascade Damage Estimation Model for Internet Attacks....Pages 163-164
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting....Pages 165-166
A Fuzzy Anomaly Detection System....Pages 167-168
Hidden Markov Model Based Intrusion Detection....Pages 169-170
One-Class Strategies for Security Information Detection....Pages 171-172
Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks....Pages 173-174
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification....Pages 175-176
Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks....Pages 177-178
Analysis of Infectious Disease Data Based on Evolutionary Computation....Pages 179-180
Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis....Pages 181-182
A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems....Pages 183-184
Back Matter....Pages -


This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006).

The 32 revised full papers presented together with the abstract of the keynote talk were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.


Content:
Front Matter....Pages -
Data Mining for Security Applications....Pages 1-3
Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity....Pages 4-15
Multi-lingual Detection of Terrorist Content on the Web....Pages 16-30
INEXT: An Investigative Search Tool for Knowledge Extraction....Pages 31-37
Cybercrime in Taiwan – An Analysis of Suspect Records....Pages 38-48
Analysis of Computer Crime Characteristics in Taiwan....Pages 49-57
A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination....Pages 58-65
Detecting Novel Network Attacks with a Data Field....Pages 66-72
Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication....Pages 73-78
Illegal Intrusion Detection Based on Hidden Information Database....Pages 79-84
Defender Personality Traits....Pages 85-90
Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database....Pages 91-102
Country Corruption Analysis with Self Organizing Maps and Support Vector Machines....Pages 103-114
Temporal Representation in Spike Detection of Sparse Personal Identity Streams....Pages 115-126
Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots....Pages 127-132
VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming....Pages 133-138
Integration of a Cryptographic File System and Access Control....Pages 139-151
Applications of Homomorphic Functions to Software Obfuscation....Pages 152-153
Security Model for Informational Privacy....Pages 154-155
A Viable System for Tracing Illegal Users of Video....Pages 156-158
Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution....Pages 159-160
The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication....Pages 161-162
Cascade Damage Estimation Model for Internet Attacks....Pages 163-164
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting....Pages 165-166
A Fuzzy Anomaly Detection System....Pages 167-168
Hidden Markov Model Based Intrusion Detection....Pages 169-170
One-Class Strategies for Security Information Detection....Pages 171-172
Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks....Pages 173-174
A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification....Pages 175-176
Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks....Pages 177-178
Analysis of Infectious Disease Data Based on Evolutionary Computation....Pages 179-180
Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis....Pages 181-182
A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems....Pages 183-184
Back Matter....Pages -
....
Download the book Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen