Intelligence and Security Informatics

IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings

  • Sharad Mehrotra
  • Daniel D. Zeng
  • Hsinchun Chen
  • Bhavani Thuraisingham
  • Fei-Yue Wang
Conference proceedings ISI 2006

DOI: 10.1007/11760146

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)

Table of contents

  1. Front Matter
  2. Long Papers

    1. Intelligence Analysis and Knowledge Discovery

      1. Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart et al.
        Pages 26-34
      2. Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza
        Pages 48-59
      3. Ahmed Abbasi, Hsinchun Chen
        Pages 60-71
      4. Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ron Eaglin
        Pages 72-82
      5. David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers
        Pages 93-104
    2. Access Control, Privacy, and Cyber Trust

      1. HyangChang Choi, SeungYong Lee, HyungHyo Lee
        Pages 129-140
      2. Artak Amirbekyan, V. Estivill-Castro
        Pages 141-153
      3. Jianming He, Wesley W. Chu, Zhenyu (Victor) Liu
        Pages 154-165
    3. Surveillance and Emergency Response

      1. Xiaolei Li, Jiawei Han, Sangkyum Kim
        Pages 166-177
      2. Chen Bo, Bin Xing Fang, Xiao Chun Yun
        Pages 178-189
      3. SzeWang Fong, David B. Skillicorn, D. Roussinov
        Pages 190-200
      4. J. Baumes, M. Goldberg, M. Hayvanovych, M. Magdon-Ismail, W. Wallace, M. Zaki
        Pages 201-212
      5. Evrim Acar, Seyit A. Çamtepe, Bülent Yener
        Pages 213-224

About these proceedings

Introduction

In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conf- ence series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California, in May 2006. In addition to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and infor- tion technologies and tools.

Keywords

Distributed Denial of Service E-Mail Ubiquitous Computing access control biometrics collaborative computing deception detection identity information processing information technology knowledge management monitori organization privacy robot

Editors and affiliations

  • Sharad Mehrotra
    • 1
  • Daniel D. Zeng
    • 2
  • Hsinchun Chen
    • 3
  • Bhavani Thuraisingham
    • 4
  • Fei-Yue Wang
    • 5
  1. 1.School of Information and Computer ScienceUniversity of CaliforniaIrvine
  2. 2.MIS DepartmentUniversity of ArizonaTucsonUSA
  3. 3.Department of Management Information Systems, Eller College of ManagementThe University of ArizonaUSA
  4. 4.University of Texas at Dallas 
  5. 5.Chinese Academy of SciencesBeijingChina

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-34478-0
  • Online ISBN 978-3-540-34479-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349