Intelligence And Security Informatics - Kantor Paul (Curatore); Muresan Gheorghe (Curatore); Roberts Fred (Curatore); Zeng Daniel (Curatore); Wang Frei-Yue (Curatore); Chen Hsinchun (Curatore); Merkle Ralph (Curatore) | Libro Springer Berlin Heidelberg 05/2005 -

home libri books ebook dvd e film top ten sconti 0 Carrello

Torna Indietro

kantor paul (curatore); muresan gheorghe (curatore); roberts fred (curatore); zeng daniel (curatore); wang frei-yue (curatore); chen hsinchun (curatore); merkle ralph (curatore) - intelligence and security informatics

Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings

; ; ; ; ; ;

Disponibilità: Normalmente disponibile in 15 giorni

129,98 €

Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.

Pagabile anche con 18App Bonus Cultura e Carta del Docente

Facebook Twitter Aggiungi commento

Spese Gratis


Lingua: Inglese
Pubblicazione: 05/2005
Edizione: 2005


Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).


Long Papers.- Collusion Set Detection Through Outlier Discovery.- Digging in the Details: A Case Study in Network Data Mining.- Efficient Identification of Overlapping Communities.- Event-Driven Document Selection for Terrorism Information Extraction.- Link Analysis Tools for Intelligence and Counterterrorism.- Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature.- Private Mining of Association Rules.- Design Principles of Coordinated Multi-incident Emergency Response Systems.- Multi-modal Biometrics with PKI Technologies for Border Control Applications.- Risk Management Using Behavior Based Bayesian Networks.- Sensitivity Analysis of an Attack Containment Model.- Toward a Target-Specific Method of Threat Assessment.- Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts.- Integrating Private Databases for Data Analysis.- Applying Authorship Analysis to Arabic Web Content.- Automatic Extraction of Deceptive Behavioral Cues from Video.- Automatically Determining an Anonymous Author’s Native Language.- A Cognitive Model for Alert Correlation in a Distributed Environment.- Beyond Keyword Filtering for Message and Conversation Detection.- Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS).- Modeling and Multiway Analysis of Chatroom Tensors.- Selective Fusion for Speaker Verification in Surveillance.- A New Conceptual Framework to Resolve Terrorism’s Root Causes.- Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network.- A Conceptual Model of Counterterrorist Operations.- Measuring Success in Countering Terrorism: Problems and Pitfalls.- Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis.- Testing a Rational Choice Model of Airline Hijackings.- Short Papers.- Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms.- Discovering Identity Problems: A Case Study.- Efficient Discovery of New Information in Large Text Databases.- Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content.- LSI-Based Taxonomy Generation: The Taxonomist System.- Some Marginal Learning Algorithms for Unsupervised Problems.- Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites.- Evaluating an Infectious Disease Information Sharing and Analysis System.- How Question Answering Technology Helps to Locate Malevolent Online Content.- Information Supply Chain: A Unified Framework for Information-Sharing.- Map-Mediated GeoCollaborative Crisis Management.- Thematic Indicators Derived from World News Reports.- A Novel Watermarking Algorithm Based on SVD and Zernike Moments.- A Survey of Software Watermarking.- Data Distortion for Privacy Protection in a Terrorist Analysis System.- Deception Across Cultures: Bottom-Up and Top-Down Approaches.- Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.- Active Automation of the DITSCAP.- An Ontological Approach to the Document Access Problem of Insider Threat.- Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall.- Intrusion Detection System Using Sequence and Set Preserving Metric.- The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level.- Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation.- A Jackson Network-Based Model for Quantitative Analysis of Network Security.- Biomonitoring, Phylogenetics and Anomaly Aggregation Systems.- CODESSEAL: Compiler/FPGA Approach to Secure Applications.- Computational Tool in Infrastructure Emergency Total Evacuation Analysis.- Performance Study of a Compiler/Hardware Approach to Embedded Systems Security.- A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems.- Connections in the World of International Terrorism.- Forecasting Terrorism: Indicators and Proven Analytic Techniques.- Forecasting Terrorist Groups’ Warfare: ‘Conventional’ to CBRN.- The Qualitative Challenge of Insurgency Informatics.- The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events.- Extended Abstracts for Posters and Demos.- A Group Decision-Support Method for Search and Rescue Based on Markov Chain.- A New Relationship Form in Data Mining.- A Study of ”Root Causes of Conflict” Using Latent Semantic Analysis.- An Empirical Study on Dynamic Effects on Deception Detection.- Anti Money Laundering Reporting and Investigation – Sorting the Wheat from the Chaff.- Application of Latent Semantic Indexing to Processing of Noisy Text.- Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques.- Mining Schemas in Semistructured Data Using Fuzzy Decision Trees.- More Than a Summary: Stance-Shift Analysis.- Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots.- BioPortal: Sharing and Analyzing Infectious Disease Information.- DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information.- Processing High-Speed Intelligence Feeds in Real-Time.- Question Answer TARA: A Terrorism Activity Resource Application.- Template Based Semantic Similarity for Security Applications.- The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web.- Toward an ITS Specific Knowledge Engine.- A Blind Image Watermarking Using for Copyright Protection and Tracing.- Towards an Effective Wireless Security Policy for Sensitive Organizations.- A Taxonomy of Cyber Attacks on 3G Networks.- An Adaptive Approach to Handle DoS Attack for Web Services.- An Architecture for Network Security Using Feedback Control.- Defending a Web Browser Against Spying with Browser Helper Objects.- Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet.- Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel.- Gathering Digital Evidence in Response to Information Security Incidents.- On the QP Algorithm in Software Watermarking.- On the Use of Opaque Predicates in Mobile Agent Code Obfuscation.- Secure Contents Distribution Using Flash Memory Technology.- Infrastructure Protection and Emergency Response.- Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities.- Securing Grid-Based Critical Infrastructures.- The Safety Alliance of Cushing – A Model Example of Cooperation as an Effective Counterterrorism Tool.- Surveillance, Border Protection, and Transportation Systems.- A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques.- An Agent-Based Framework for a Traffic Security Management System.- Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle.- Application of Cooperative Co-evolution in Pedestrian Detection Systems.- Biometric Fingerprints Based Radio Frequency Identification.- BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.

i libri che interessano a chi ha i tuoi gusti

Altre Informazioni



Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm Ø 2130 gr
Formato: Brossura
Pagine Arabe: 678
Pagine Romane: xviii

Utilizziamo i cookie di profilazione, anche di terze parti, per migliorare la navigazione, per fornire servizi e proporti pubblicità in linea con le tue preferenze. Se vuoi saperne di più o negare il consenso a tutti o ad alcuni cookie clicca qui. Chiudendo questo banner o proseguendo nella navigazione acconsenti all’uso dei cookie.