Intelligence and Security Informatics

IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

ISBN: 978-3-540-25999-2 (Print) 978-3-540-32063-0 (Online)

Table of contents (100 chapters)

previous Page of 5
  1. Front Matter

    Pages -

  2. Long Papers

    1. Deception Detection and Authorship Analysis

      1. No Access

        Book Chapter

        Pages 183-197

        Applying Authorship Analysis to Arabic Web Content

      2. No Access

        Book Chapter

        Pages 198-208

        Automatic Extraction of Deceptive Behavioral Cues from Video

      3. No Access

        Book Chapter

        Pages 209-217

        Automatically Determining an Anonymous Author’s Native Language

      Monitoring and Surveillance

      1. No Access

        Book Chapter

        Pages 218-230

        A Cognitive Model for Alert Correlation in a Distributed Environment

      2. No Access

        Book Chapter

        Pages 231-243

        Beyond Keyword Filtering for Message and Conversation Detection

      3. No Access

        Book Chapter

        Pages 244-255

        Content-Based Detection of Terrorists Browsing the Web Using an Advanced Terror Detection System (ATDS)

      Data and Text Mining

      1. No Access

        Book Chapter

        Pages 1-13

        Collusion Set Detection Through Outlier Discovery

      2. No Access

        Book Chapter

        Pages 14-26

        Digging in the Details: A Case Study in Network Data Mining

      3. No Access

        Book Chapter

        Pages 27-36

        Efficient Identification of Overlapping Communities

      4. No Access

        Book Chapter

        Pages 37-48

        Event-Driven Document Selection for Terrorism Information Extraction

      5. No Access

        Book Chapter

        Pages 49-59

        Link Analysis Tools for Intelligence and Counterterrorism

      6. No Access

        Book Chapter

        Pages 60-71

        Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature

      7. No Access

        Book Chapter

        Pages 72-80

        Private Mining of Association Rules

      Infrastructure Protection and Emergency Response

      1. No Access

        Book Chapter

        Pages 81-98

        Design Principles of Coordinated Multi-incident Emergency Response Systems

      2. No Access

        Book Chapter

        Pages 99-114

        Multi-modal Biometrics with PKI Technologies for Border Control Applications

      3. No Access

        Book Chapter

        Pages 115-126

        Risk Management Using Behavior Based Bayesian Networks

      4. No Access

        Book Chapter

        Pages 127-138

        Sensitivity Analysis of an Attack Containment Model

      5. No Access

        Book Chapter

        Pages 139-152

        Toward a Target-Specific Method of Threat Assessment

      Information Management

      1. No Access

        Book Chapter

        Pages 153-170

        Incident and Casualty Databases as a Tool for Understanding Low-Intensity Conflicts

      2. No Access

        Book Chapter

        Pages 171-182

        Integrating Private Databases for Data Analysis

previous Page of 5