Intelligence and Security Informatics

IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings

  • Paul Kantor
  • Gheorghe Muresan
  • Fred Roberts
  • Daniel D. Zeng
  • Fei-Yue Wang
  • Hsinchun Chen
  • Ralph C. Merkle

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3495)

Table of contents

  1. Front Matter
  2. Long Papers

    1. Data and Text Mining

      1. Vandana P. Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam
        Pages 1-13
      2. John Galloway, Simeon J. Simoff
        Pages 14-26
      3. Jeffrey Baumes, Mark Goldberg, Malik Magdon-Ismail
        Pages 27-36
      4. Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna
        Pages 37-48
      5. Antonio Badia, Mehmed Kantardzic
        Pages 49-59
      6. Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael Atwood
        Pages 60-71
      7. Justin Zhan, Stan Matwin, LiWu Chang
        Pages 72-80
    2. Infrastructure Protection and Emergency Response

      1. Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu Upadhyaya
        Pages 81-98
      2. Ram Dantu, Prakash Kolan
        Pages 115-126
      3. Ram Dantu, João W. Cangussu, Janos Turi
        Pages 127-138
    3. Information Management

    4. Deception Detection and Authorship Analysis

      1. Ahmed Abbasi, Hsinchun Chen
        Pages 183-197
      2. Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker
        Pages 198-208
      3. Moshe Koppel, Jonathan Schler, Kfir Zigdon
        Pages 209-217
    5. Monitoring and Surveillance

About these proceedings

Introduction

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).

Keywords

DOM Internet access control biometrics crime analysis data security deception detection homeland security identity information security infrastructure security intelligence informatics privacy security security informatics

Editors and affiliations

  • Paul Kantor
    • 1
  • Gheorghe Muresan
    • 2
  • Fred Roberts
    • 3
  • Daniel D. Zeng
    • 4
  • Fei-Yue Wang
    • 5
  • Hsinchun Chen
    • 6
  • Ralph C. Merkle
    • 7
  1. 1.Department of Library and Information ScienceRutgers University 
  2. 2.School of Communication, Information and Library StudiesRutgers UniversityNew BrunswickUSA
  3. 3.Artificial SolutionsHamburgGermany
  4. 4.MIS DepartmentUniversity of ArizonaTucsonUSA
  5. 5.Institute of AutomationChinese Academy of SciencesBeijingChina
  6. 6.Department of Management Information Systems, Eller College of ManagementThe University of ArizonaUSA
  7. 7.College of Computing, Georgia Tech Information Security CenterGeorgia Institute of TechnologyAtlantaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b136511
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-25999-2
  • Online ISBN 978-3-540-32063-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book