Intelligence and Security Informatics

Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings

  • Hsinchun Chen
  • Reagan Moore
  • Daniel D. Zeng
  • John Leavitt

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3073)

Table of contents

  1. Front Matter
  2. Full Papers

    1. Bioterrorism and Disease Informatics

      1. Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas Fridsma et al.
        Pages 1-16
      2. Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki
        Pages 17-27
      3. Daniel Zeng, Hsinchun Chen, Chunju Tseng, Catherine Larson, Millicent Eidson, Ivan Gotham et al.
        Pages 28-41
    2. Data Access Control, Privacy, and Trust Management

      1. Zhengyou Xia, Yichuan Jiang, Yiping Zhong, Shiyong Zhang
        Pages 42-55
      2. Yichuan Jiang, Zhengyou Xia, Yiping Zhong, Shiyong Zhang
        Pages 56-65
      3. Gang Liang, Sudarshan S. Chawathe
        Pages 66-82
    3. Data Management and Mining

      1. Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien
        Pages 100-113
      2. Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Xu, Yilu Zhou, Rob Schumaker et al.
        Pages 125-145
      3. Alan Demers, Johannes Gehrke, Mirek Riedewald
        Pages 146-162
    4. Deception Detection

      1. Jinwei Cao, Ming Lin, Amit Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins
        Pages 163-175
      2. Hung-Ching Chen, Mark Goldberg, Malik Magdon-Ismail
        Pages 176-186
    5. Information Assurance and Infrastructure Protection

      1. Joon S. Park, Shuyuan Mary Ho
        Pages 201-213
      2. William J. Tolone, David Wilson, Anita Raja, Wei-ning Xiang, Huili Hao, Stuart Phelps et al.
        Pages 214-225
    6. Monitoring and Surveillance

      1. Ahmet Çamtepe, Mukkai S. Krishnamoorthy, Bülent Yener
        Pages 252-265

About these proceedings

Keywords

E-Mail IT security Internet architecture bioinformatics crime analysis deception detection information system information technology intelligence intelligence security national security organization security informatics vulnerability analysis

Editors and affiliations

  • Hsinchun Chen
    • 1
  • Reagan Moore
    • 2
  • Daniel D. Zeng
    • 3
  • John Leavitt
    • 4
  1. 1.Department of Management Information Systems, Eller College of Management,The University of ArizonaUSA
  2. 2.San Diego Supercomputer CenterLa JollaUSA
  3. 3.MIS DepartmentUniversity of ArizonaTucsonUSA
  4. 4.Tucson Police DepartmentTucsonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b98042
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-22125-8
  • Online ISBN 978-3-540-25952-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book