Skip to main content
  • Conference proceedings
  • © 2005

Intelligence and Security Informatics

IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3495)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): ISI: International Conference on Intelligence and Security Informatics

Conference proceedings info: ISI 2005.

Buying options

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (100 papers)

  1. Front Matter

  2. Long Papers

    1. Data and Text Mining

      1. Collusion Set Detection Through Outlier Discovery
        • Vandana P. Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam
        Pages 1-13
      2. Digging in the Details: A Case Study in Network Data Mining
        • John Galloway, Simeon J. Simoff
        Pages 14-26
      3. Efficient Identification of Overlapping Communities
        • Jeffrey Baumes, Mark Goldberg, Malik Magdon-Ismail
        Pages 27-36
      4. Event-Driven Document Selection for Terrorism Information Extraction
        • Zhen Sun, Ee-Peng Lim, Kuiyu Chang, Teng-Kwee Ong, Rohan Kumar Gunaratna
        Pages 37-48
      5. Link Analysis Tools for Intelligence and Counterterrorism
        • Antonio Badia, Mehmed Kantardzic
        Pages 49-59
      6. Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature
        • Xiaohua Hu, Illhoi Yoo, Peter Rumm, Michael Atwood
        Pages 60-71
      7. Private Mining of Association Rules
        • Justin Zhan, Stan Matwin, LiWu Chang
        Pages 72-80
    2. Infrastructure Protection and Emergency Response

      1. Design Principles of Coordinated Multi-incident Emergency Response Systems
        • Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu Upadhyaya
        Pages 81-98
      2. Risk Management Using Behavior Based Bayesian Networks
        • Ram Dantu, Prakash Kolan
        Pages 115-126
      3. Sensitivity Analysis of an Attack Containment Model
        • Ram Dantu, João W. Cangussu, Janos Turi
        Pages 127-138
    3. Information Management

      1. Integrating Private Databases for Data Analysis
        • Ke Wang, Benjamin C. M. Fung, Guozhu Dong
        Pages 171-182
    4. Deception Detection and Authorship Analysis

      1. Applying Authorship Analysis to Arabic Web Content
        • Ahmed Abbasi, Hsinchun Chen
        Pages 183-197
      2. Automatic Extraction of Deceptive Behavioral Cues from Video
        • Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker
        Pages 198-208
      3. Automatically Determining an Anonymous Author’s Native Language
        • Moshe Koppel, Jonathan Schler, Kfir Zigdon
        Pages 209-217
    5. Monitoring and Surveillance

      1. A Cognitive Model for Alert Correlation in a Distributed Environment
        • Ambareen Siraj, Rayford B. Vaughn
        Pages 218-230

Other Volumes

  1. Intelligence and Security Informatics

About this book

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach. In the past few years, ISI research has experienced tremendous growth and attracted substantial interest from academic researchers in related fields as well as practitioners from both government agencies and industry. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conference series were held in Tucson, Arizona, in 2003 and 2004, respectively. They provided a stimulating intellectual forum for discussion among previously disparate communities: academic researchers in information technologies, computer science, public policy, and social studies; local, state, and federal law enforcement and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of these ISI meetings and with sponsorship by the IEEE, we held the IEEE International Conference on Intelligence and Security Informatics (ISI 2005) in May 2005 in Atlanta, Georgia. In addition to the established and emerging ISI research topics covered at past ISI meetings, ISI 2005 included a new track on Terrorism Informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and information technologies and tools. ISI 2005 was jointly hosted by Rutgers, the State University of New Jersey; the University of Arizona (UA); and the Georgia Institute of Technology (GATECH).

Keywords

  • DOM
  • Internet
  • access control
  • biometrics
  • crime analysis
  • data security
  • deception detection
  • homeland security
  • identity
  • information security
  • infrastructure security
  • intelligence informatics
  • privacy
  • security
  • security informatics

Editors and Affiliations

  • Department of Library and Information Science, Rutgers University,  

    Paul Kantor

  • School of Communication, Information and Library Studies, Rutgers University, New Brunswick, USA

    Gheorghe Muresan

  • Artificial Solutions, Hamburg, Germany

    Fred Roberts

  • MIS Department, University of Arizona, Tucson, USA

    Daniel D. Zeng

  • Institute of Automation, Chinese Academy of Sciences, Beijing, China

    Fei-Yue Wang

  • Department of Management Information Systems, Eller College of Management, The University of Arizona, USA

    Hsinchun Chen

  • College of Computing, Georgia Tech Information Security Center, Georgia Institute of Technology, Atlanta, USA

    Ralph C. Merkle

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions