Intelligence and Security Informatics

Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

  • Hsinchun Chen
  • Reagan Moore
  • Daniel D. Zeng
  • John Leavitt
Conference proceedings ISI 2004

DOI: 10.1007/b98042

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3073)

Table of contents

  1. Front Matter
  2. Full Papers

    1. Bioterrorism and Disease Informatics

      1. Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas Fridsma et al.
        Pages 1-16
      2. Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki
        Pages 17-27
      3. Daniel Zeng, Hsinchun Chen, Chunju Tseng, Catherine Larson, Millicent Eidson, Ivan Gotham et al.
        Pages 28-41
    2. Data Access Control, Privacy, and Trust Management

      1. Zhengyou Xia, Yichuan Jiang, Yiping Zhong, Shiyong Zhang
        Pages 42-55
      2. Yichuan Jiang, Zhengyou Xia, Yiping Zhong, Shiyong Zhang
        Pages 56-65
      3. Gang Liang, Sudarshan S. Chawathe
        Pages 66-82
    3. Data Management and Mining

      1. Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien
        Pages 100-113
      2. Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker et al.
        Pages 125-145
      3. Alan Demers, Johannes Gehrke, Mirek Riedewald
        Pages 146-162
    4. Deception Detection

      1. Jinwei Cao, Ming Lin, Amit Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins
        Pages 163-175
      2. Hung-Ching Chen, Mark Goldberg, Malik Magdon-Ismail
        Pages 176-186
    5. Information Assurance and Infrastructure Protection

      1. Joon S. Park, Shuyuan Mary Ho
        Pages 201-213
      2. William J. Tolone, David Wilson, Anita Raja, Wei-ning Xiang, Huili Hao, Stuart Phelps et al.
        Pages 214-225
    6. Monitoring and Surveillance

      1. Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener
        Pages 252-265

About these proceedings

Keywords

E-Mail IT security Internet architecture bioinformatics crime analysis deception detection information system information technology intelligence intelligence security national security organization security informatics vulnerability analysis

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Reagan Moore
    • 2
  • Daniel D. Zeng
    • 3
  • John Leavitt
    • 4
  1. 1.Department of Management Information Systems, Eller College of Management,The University of ArizonaUSA
  2. 2.San Diego Supercomputer CenterLa JollaUSA
  3. 3.MIS DepartmentUniversity of ArizonaTucsonUSA
  4. 4.Tucson Police DepartmentTucsonUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-22125-8
  • Online ISBN 978-3-540-25952-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349