Advertisement

Intelligence and Security Informatics

International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings

  • Hsinchun Chen
  • Fei-Yue Wang
  • Christopher C. Yang
  • Daniel Zeng
  • Michael Chau
  • Kuiyu Chang
Conference proceedings WISI 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3917)

Table of contents

  1. Front Matter
  2. Keynote Speech

    1. Bhavani M. Thuraisingham
      Pages 1-3
  3. Web and Text Mining for Terrorism Informatics

  4. Cybercrime Analysis

  5. Network Security

    1. Feng Xie, Shuo Bai
      Pages 66-72
    2. Huizhang Shen, Jidi Zhao, Huanchen Wang
      Pages 79-84
    3. Tara Whalen, Carrie Gates
      Pages 85-90
  6. Crime Data Mining

    1. Patrick S. Chen, K. C. Chang, Tai-Ping Hsing, Shihchieh Chou
      Pages 91-102
    2. Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen, Tony Van Gestel
      Pages 103-114
    3. Clifton Phua, Vincent Lee, Ross Gayler, Kate Smith
      Pages 115-126
    4. Shaojie Qiao, Changjie Tang, Jing Peng, Hongjian Fan, Yong Xiang
      Pages 133-138
  7. Posters

    1. SeongKi Kim, WanJin Park, SeokKyoo Kim, SunIl Ahn, SangYong Han
      Pages 139-151
    2. William Zhu, Clark Thomborson, Fei-Yue Wang
      Pages 152-153
    3. Sabah S. Al-Fedaghi
      Pages 154-155
    4. Hyunho Kang, Brian Kurkoski, Youngran Park, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi
      Pages 156-158
    5. Pilsung Kang, Sunghoon Park, Sungzoon Cho, Seong-seob Hwang, Hyoung-joo Lee
      Pages 161-162
    6. Taek Lee, Hoh Peter In, Eul-Gyu Im, Heejo Lee
      Pages 163-164
    7. Dan Li, Kefei Wang, Jitender S. Deogun
      Pages 167-168
    8. Zhi-Yong Liu, Hong Qiao
      Pages 169-170
    9. Qing Tao, Gao-wei Wu, Jue Wang
      Pages 171-172
    10. Baihua Xiao, Huiguang He, Yaodong Li, Chunheng Wang
      Pages 177-178
  8. Back Matter

About these proceedings

Introduction

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception detection, terrorist and criminal social network analysis, crime analysis, monitoring and surveillance, policy studies and evaluation, and information assurance, among others. We continued these stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI 2006) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). WISI 2006 provided a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. WISI 2006 was hosted by the Chinese University of Hong Kong, the University of Arizona, the Nanyang Technological University, and the Chinese Academy of Sciences. The one-day program included one keynote speech, four refereed paper sessions, two invited sessions and a poster reception.

Keywords

access control biometrics crime analysis data analysis data mining deception detection homeland security information assurance infrastructure security intelligence informatics intrusion detection national security network security privacy se

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Fei-Yue Wang
    • 2
  • Christopher C. Yang
    • 3
  • Daniel Zeng
    • 4
  • Michael Chau
    • 5
  • Kuiyu Chang
    • 6
  1. 1.Department of Management Information Systems, Eller College of ManagementThe University of ArizonaUSA
  2. 2.Chinese Academy of SciencesBeijingChina
  3. 3.Drexel UniversityPhiladelphiaUSA
  4. 4.MIS Department, University of Arizona, and Chinese Academy of SciencesTucsonUSA
  5. 5.The University of Hong KongHong KongChina
  6. 6.School of Computer EngineeringNanyang Technological University639798Singapore

Bibliographic information

  • DOI https://doi.org/10.1007/11734628
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-33361-6
  • Online ISBN 978-3-540-33362-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site