default search action
3rd ISI 2005: Atlanta, Georgia, USA
- Paul B. Kantor, Gheorghe Muresan, Fred S. Roberts, Daniel Dajun Zeng, Fei-Yue Wang, Hsinchun Chen, Ralph C. Merkle:
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings. Lecture Notes in Computer Science 3495, Springer 2005, ISBN 3-540-25999-6
Long Papers
Data and Text Mining
- Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam:
Collusion Set Detection Through Outlier Discovery. 1-13 - John Galloway, Simeon J. Simoff:
Digging in the Details: A Case Study in Network Data Mining. 14-26 - Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail:
Efficient Identification of Overlapping Communities. 27-36 - Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna:
Event-Driven Document Selection for Terrorism Information Extraction. 37-48 - Antonio Badia, Mehmed M. Kantardzic:
Link Analysis Tools for Intelligence and Counterterrorism. 49-59 - Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael E. Atwood:
Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. 60-71 - Justin Zhijun Zhan, Stan Matwin, LiWu Chang:
Private Mining of Association Rules. 72-80
Infrastructure Protection and Emergency Response
- Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya:
Design Principles of Coordinated Multi-incident Emergency Response Systems. 81-98 - Taekyoung Kwon, Hyeonjoon Moon:
Multi-modal Biometrics with PKI Technologies for Border Control Applications. 99-114 - Ram Dantu, Prakash Kolan:
Risk Management Using Behavior Based Bayesian Networks. 115-126 - Ram Dantu, João W. Cangussu, Janos Turi:
Sensitivity Analysis of an Attack Containment Model. 127-138 - Yael Shahar:
Toward a Target-Specific Method of Threat Assessment. 139-152
Information Management
- Don Radlauer:
Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts. 153-170 - Ke Wang, Benjamin C. M. Fung, Guozhu Dong:
Integrating Private Databases for Data Analysis. 171-182
Deception Detection and Authorship Analysis
- Ahmed Abbasi, Hsinchun Chen:
Applying Authorship Analysis to Arabic Web Content. 183-197 - Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Automatic Extraction of Deceptive Behavioral Cues from Video. 198-208 - Moshe Koppel, Jonathan Schler, Kfir Zigdon:
Automatically Determining an Anonymous Author's Native Language. 209-217
Monitoring and Surveillance
- Ambareen Siraj, Rayford B. Vaughn:
A Cognitive Model for Alert Correlation in a Distributed Environment. 218-230 - David B. Skillicorn:
Beyond Keyword Filtering for Message and Conversation Detection. 231-243 - Yuval Elovici, Bracha Shapira, Mark Last, Omer Zaafrany, Menahem Friedman, Moti Schneider, Abraham Kandel:
Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS). 244-255 - Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener:
Modeling and Multiway Analysis of Chatroom Tensors. 256-268 - Yosef A. Solewicz, Moshe Koppel:
Selective Fusion for Speaker Verification in Surveillance. 269-279
Terrorism Informatics
- Joshua Sinai:
A New Conceptual Framework to Resolve Terrorism's Root Causes. 280-286 - Jialun Qin, Jennifer Jie Xu, Daning Hu, Marc Sageman, Hsinchun Chen:
Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network. 287-304 - David Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III:
A Conceptual Model of Counterterrorist Operations. 305-315 - Peter S. Probst:
Measuring Success in Countering Terrorism: Problems and Pitfalls. 316-321 - Edna Reid, Hsinchun Chen:
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis. 322-339 - Laura Dugan, Gary LaFree, Alex R. Piquero:
Testing a Rational Choice Model of Airline Hijackings. 340-361
Short Papers
Data and Text Mining
- Hilmi Günes Kayacik, Nur Zincir-Heywood:
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. 362-367 - Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsinchun Chen:
Discovering Identity Problems: A Case Study. 368-373 - Roger B. Bradford:
Efficient Discovery of New Information in Large Text Databases. 374-380 - Özgür Yilmazel, Svetlana Symonenko, Niranjan Balasubramanian, Elizabeth D. Liddy:
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content. 381-388 - Janusz Wnek:
LSI-Based Taxonomy Generation: The Taxonomist System. 389-394 - Qing Tao, Gao-wei Wu, Fei-Yue Wang, Jue Wang:
Some Marginal Learning Algorithms for Unsupervised Problems. 395-401
Information Management and Sharing
- Edna Reid, Jialun Qin, Yilu Zhou, Guanpi Lai, Marc Sageman, Gabriel Weimann, Hsinchun Chen:
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites. 402-411 - Paul Jen-Hwa Hu, Daniel Dajun Zeng, Hsinchun Chen, Catherine A. Larson, Wei Chang, Chunju Tseng:
Evaluating an Infectious Disease Information Sharing and Analysis System. 412-417 - Dmitri Roussinov, Jose Antonio Robles-Flores:
How Question Answering Technology Helps to Locate Malevolent Online Content. 418-421 - Shuang Sun, John Yen:
Information Supply Chain: A Unified Framework for Information-Sharing. 422-428 - Guoray Cai, Alan M. MacEachren, Isaac Brewer, Michael D. McNeese, Rajeev Sharma, Sven Fuhrmann:
Map-Mediated GeoCollaborative Crisis Management. 429-435 - Clive Best, Erik Van der Goot, Monica de Paola:
Thematic Indicators Derived from World News Reports. 436-447
Copyright and Privacy Protection
- Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen:
A Novel Watermarking Algorithm Based on SVD and Zernike Moments. 448-453 - William Zhu, Clark D. Thomborson, Fei-Yue Wang:
A Survey of Software Watermarking. 454-458 - Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang:
Data Distortion for Privacy Protection in a Terrorist Analysis System. 459-464
Deception Detection
- Lina Zhou, Simon Lutterbie:
Deception Across Cultures: Bottom-Up and Top-Down Approaches. 465-470 - Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. 471-478
Information Security and Intrusion Detection
- Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn, Deepak S. Yavagal:
Active Automation of the DITSCAP. 479-485 - Boanerges Aleman-Meza, Phillip Burns, Matthew Eavenson, Devanand Palaniswami, Amit P. Sheth:
An Ontological Approach to the Document Access Problem of Insider Threat. 486-491 - Gregory J. Conti, Mustaque Ahamad, Robert Norback:
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall. 492-497 - Pradeep Kumar, M. Venkateswara Rao, P. Radha Krishna, Raju S. Bapi, Arijit Laha:
Intrusion Detection System Using Sequence and Set Preserving Metric. 498-504 - Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan:
The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level. 505-510 - Dae-Ki Kang, Doug Fuller, Vasant G. Honavar:
Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation. 511-516
Infrastructure Protection and Emergency Response
- Zhengtao Xiang, Yufeng Chen, Wei Jian, Fei Yan:
A Jackson Network-Based Model for Quantitative Analysis of Network Security. 517-522 - David R. B. Stockwell, Jason T. L. Wang:
Biomonitoring, Phylogenetics and Anomaly Aggregation Systems. 523-529 - Olga Gelbart, Paul Ott, Bhagirath Narahari, Rahul Simha, Alok N. Choudhary, Joseph Zambreno:
CODESSEAL: Compiler/FPGA Approach to Secure Applications. 530-535 - Kelvin H. L. Wong, Mingchun Luo:
Computational Tool in Infrastructure Emergency Total Evacuation Analysis. 536-542 - Kripashankar Mohan, Bhagirath Narahari, Rahul Simha, Paul Ott, Alok N. Choudhary, Joseph Zambreno:
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security. 543-548 - Xinjian Chen, Jie Tian, Qi Su, Xin Yang, Fei-Yue Wang:
A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems. 549-553
Terrorism Informatics
- Yael Shahar:
Connections in the World of International Terrorism. 554-560 - Sundri K. Khalsa:
Forecasting Terrorism: Indicators and Proven Analytic Techniques. 561-566 - Joshua Sinai:
Forecasting Terrorist Groups' Warfare: 'Conventional' to CBRN. 567-570 - Scott Tousley:
The Qualitative Challenge of Insurgency Informatics. 571-578 - Robert J. Latino:
The Application of PROACT® RCA to Terrorism/Counter Terrorism Related Events. 579-589
Extended Abstracts for Posters and Demos
Data and Text Mining
- Huizhang Shen, Jidi Zhao, Ying Peng:
A Group Decision-Support Method for Search and Rescue Based on Markov Chain. 590-592 - Suwimon Kooptiwoot, Muhammad Abdus Salam:
A New Relationship Form in Data Mining. 593-594 - Mihaela Bobeica, Jean-Paul Jéral, Teofilo Garcia, Clive Best:
A Study of "Root Causes of Conflict" Using Latent Semantic Analysis. 595-596 - Tiantian Qin, Judee K. Burgoon:
An Empirical Study on Dynamic Effects on Deception Detection. 597-599 - Ana Isabel Canhoto, James Backhouse:
Anti Money Laundering Reporting and Investigation - Sorting the Wheat from the Chaff. 600-601 - Robert J. Price, Anthony E. Zukas:
Application of Latent Semantic Indexing to Processing of Noisy Text. 602-603 - Nazli Goharian, Ling Ma, Chris Meyers:
Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. 604-605 - Wei Sun, Daxin Liu:
Mining Schemas in Semistructured Data Using Fuzzy Decision Trees. 606-607 - Boyd Davis, Vivian Lord, Peyton Mason:
More Than a Summary: Stance-Shift Analysis. 608-609 - Zeng-Guang Hou:
Principal Component Analysis (PCA) for Data Fusion and Navigation of Mobile Robots. 610-611
Information Management and Sharing
- Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Wei Chang, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher:
BioPortal: Sharing and Analyzing Infectious Disease Information. 612-613 - Jin Zhu:
DIANE: Revolutionizing the Way We Collect, Analyze, and Share Information. 614-616 - Alan J. Demers, Johannes Gehrke, Mingsheng Hong, Mirek Riedewald:
Processing High-Speed Intelligence Feeds in Real-Time. 617-618 - Robert P. Schumaker, Hsinchun Chen:
Question Answer TARA: A Terrorism Activity Resource Application. 619-620 - Boanerges Aleman-Meza, Christian Halaschek-Wiener, Satya Sanket Sahoo, Amit P. Sheth, Ismailcem Budak Arpinar:
Template Based Semantic Similarity for Security Applications. 621-622 - Jialun Qin, Yilu Zhou, Guanpi Lai, Edna Reid, Marc Sageman, Hsinchun Chen:
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web. 623-624 - Guanpi Lai, Fei-Yue Wang:
Toward an ITS Specific Knowledge Engine. 625-626
Information Security and Intrusion Detection
- Haifeng Li, Shuxun Wang, Weiwei Song, Quan Wen:
A Blind Image Watermarking Using for Copyright Protection and Tracing. 627-628 - Michael Manley, Cheri McEntee, Anthony Molet, Joon S. Park:
Towards an Effective Wireless Security Policy for Sensitive Organizations. 629-630 - Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Porta:
A Taxonomy of Cyber Attacks on 3G Networks. 631-633 - Eul-Gyu Im, Yong Ho Song:
An Adaptive Approach to Handle DoS Attack for Web Services. 634-635 - Ram Dantu, João W. Cangussu:
An Architecture for Network Security Using Feedback Control. 636-637 - Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee:
Defending a Web Browser Against Spying with Browser Helper Objects. 638-639 - Zhengyou Xia, Yichuan Jiang, Jian Wang:
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet. 640-641 - Young-Hwan Oh, Hae-Young Bae:
Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel. 642-643 - Shiuh-Jeng Wang, Cheng-Hsing Yang:
Gathering Digital Evidence in Response to Information Security Incidents. 644-645 - William Zhu, Clark D. Thomborson:
On the QP Algorithm in Software Watermarking. 646-647 - Anirban Majumdar, Clark D. Thomborson:
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. 648-649 - Yong Ho Song, Eul-Gyu Im:
Secure Contents Distribution Using Flash Memory Technology. 650-651
Infrastructure Protection and Emergency Response
- Richard A. Smith:
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. 652-653 - Syed Naqvi, Michel Riguidel:
Securing Grid-Based Critical Infrastructures. 654-655 - David Zimmermann:
The Safety Alliance of Cushing - A Model Example of Cooperation as an Effective Counterterrorism Tool. 656-657
Surveillance, Border Protection, and Transportation Systems
- Xiaoyan Gong, Haijun Gao:
A Framework for Global Monitoring and Security Assistance Based on IPv6 and Multimedia Data Mining Techniques. 658-659 - Shuming Tang, Haijun Gao:
An Agent-Based Framework for a Traffic Security Management System. 660-661 - Hong Qiao, Fei-Yue Wang, Xianbin Cao:
Application of a Decomposed Support Vector Machine Algorithm in Pedestrian Detection from a Moving Vehicle. 662-663 - Xianbin Cao, Hong Qiao, Fei-Yue Wang, Xinzheng Zhang:
Application of Cooperative Co-evolution in Pedestrian Detection Systems. 664-665 - Sundaram Jayakumar, Senthilkumar Chandramohan:
Biometric Fingerprints Based Radio Frequency Identification. 666-668 - Siddharth Kaza, Byron Marshall, Jennifer Jie Xu, Alan Gang Wang, Hemanth Gowda, Homa Atabakhsh, Tim Petersen, Chuck Violette, Hsinchun Chen:
BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization. 669-670
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.