default search action
2nd ISI 2004: Tucson, AZ, USA
- Hsinchun Chen, Reagan W. Moore, Daniel Dajun Zeng, John Leavitt:
Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings. Lecture Notes in Computer Science 3073, Springer 2004, ISBN 978-3-540-22125-8
Full Papers
Bioterrorism and Disease Informatics
- Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas B. Fridsma, Alex Yahja:
Aligning Simulation Models of Smallpox Outbreaks. 1-16 - Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki:
Data Analytics for Bioterrorism Surveillance. 17-27 - Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher:
West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics. 28-41
Data Access Control, Privacy, and Trust Management
- Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang:
A Novel Policy and Information Flow Security Model for Active Network. 42-55 - Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang:
A Novel Autonomous Trust Management Model for Mobile Agents. 56-65 - Gang Liang, Sudarshan S. Chawathe:
Privacy-Preserving Inter-database Operations. 66-82
Data Management and Mining
- David B. Skillicorn:
Finding Unusual Correlation Using Matrix Decompositions. 83-99 - Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien:
Generating Concept Hierarchies from Text for Intelligence Analysis. 100-113 - Antonio Badia:
Interactive Query Languages for Intelligence Tasks. 114-124 - Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen:
Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. 125-145 - Alan J. Demers, Johannes Gehrke, Mirek Riedewald:
The Architecture of the Cornell Knowledge Broker. 146-162
Deception Detection
- Jinwei Cao, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins:
Computer-Based Training for Deception Detection: What Users Want? 163-175 - Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Ismail:
Identifying Multi-ID Users in Open Forums. 176-186 - Kent Marett, David P. Biros, Monti L. Knode:
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. 187-200
Information Assurance and Infrastructure Protection
- Joon S. Park, Shuyuan Mary Ho:
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. 201-213 - William J. Tolone, David Wilson, Anita Raja, Wei-Ning Xiang, Huili Hao, Stuart Phelps, E. Wray Johnson:
Critical Infrastructure Integration Modeling and Simulation. 214-225 - Xiangyang Li, Nong Ye:
Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. 226-238 - Enock Chisonge Mofya, Jonathan Cole Smith:
The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks. 239-251
Monitoring and Surveillance
- Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
A Tool for Internet Chatroom Surveillance. 252-265 - Jason Bengel, Susan Gauch, Eera Mittur, Rajan Vijayaraghavan:
ChatTrack: Chat Room Topic Detection Using Classification. 266-277 - Naren Kodali, Csilla Farkas, Duminda Wijesekera:
SECRETS: A Secure Real-Time Multimedia Surveillance System. 278-296 - Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka, Bülent Yener:
Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information. 297-306 - Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera:
THEMIS: Threat Evaluation Metamodel for Information Systems. 307-321
Security Policies and Evaluation
- Chris C. Demchak, Kurt D. Fenstermacher:
Balancing Security and Privacy in the 21 st Century. 322-330 - Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu:
IT Security Risk Management under Network Effects and Layered Protection Strategy. 331-348 - Gene I. Rochlin:
Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations. 349-358
Social Network Analysis
- Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen:
Analyzing and Visualizing Criminal Network Dynamics: A Case Study. 359-377 - Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail, William A. Wallace:
Discovering Hidden Groups in Communication Networks. 378-389 - Ju-Sung Lee:
Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data. 390-402
Short Papers
Deception Detection
- Douglas P. Twitchell, Jay F. Nunamaker Jr., Judee K. Burgoon:
Using Speech Act Profiling for Deception Detection. 403-410 - Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Testing Various Modes of Computer-Based Training for Deception Detection. 411-417
Data/Text Management and Mining
- Richard Adderley:
The Use of Data Mining Techniques in Operational Crime Fighting. 418-425 - Donald E. Brown, Jason Dalton, Heidi Hoyle:
Spatial Forecast Methods for Terrorist Events in Urban Environments. 426-435 - Alexander Dolotov, Mary Strickler:
Web-Based Intelligence Notification System: Architecture and Design. 436-448 - Christopher C. Yang, Kar Wing Li:
Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network. 449-456
Information Assurance and Infrastructure Protection
- Jorge Levera, Benjamín Barán, Robert L. Grossman:
Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data. 457-466 - Homa Atabakhsh, Cathy Larson, Tim Petersen, Chuck Violette, Hsinchun Chen:
Information Sharing and Collaboration Policies within Government Agencies. 467-475 - Myung-Kyu Yi, Chong-Sun Hwang:
Intrusion-Tolerant Intrusion Detection System. 476-483 - Benjamin B. M. Shao:
Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy. 484-491 - Svetlana Symonenko, Elizabeth D. Liddy, Özgür Yilmazel, Robert Del Zoppo, Eric Brown, Matt Downey:
Semantic Analysis for Monitoring Insider Threats. 492-500 - Anand Natarajan, Liaquat Hossain:
Towards a Social Network Approach for Monitoring Insider Threats to Information Security. 501-507
Extended Abstracts for Posters
- Eric Hughes, Amy Kazura, Arnie Rosenthal:
Policy-Based Information Sharing with Semantics. 508-509 - Robert H. Warren, Christopher Leurer:
Determining the Gender of the Unseen Name through Hyphenation. 510-511 - Raj Sharman, Himabindu Challapalli, H. Raghav Rao, Shambhu J. Upadhyaya:
A Framework for a Secure Federated Patient Healthcare System. 512-513 - Eung Ki Park, Jung-Taek Seo, Eul-Gyu Im, Cheolwon Lee:
Vulnerability Analysis and Evaluation within an Intranet. 514-515 - Susan M. Merritt, Allen Stix, Judith E. Sullivan:
Security Informatics: A Paradigm Shift in Information Technology Education. 516-517 - Yufeng Chen, Yabo Dong, Dongming Lu, Zhengtao Xiang:
Research of Characteristics of Worm Traffic. 518-519
Panel Discussion Papers
- James O. Ellis III:
MIPT: Sharing Terrorism Information Resources. 520-525 - Rohan Kumar Gunaratna:
Post-9/11 Evolution of Al Qaeda. 526-530 - Joshua Sinai:
Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. 531-533
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.