Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings

Author:   Hsinchun Chen ,  Reagan Moore ,  Daniel D. Zeng ,  John Leavitt
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2004 ed.
Volume:   3073
ISBN:  

9783540221258


Pages:   544
Publication Date:   01 June 2004
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $274.56 Quantity:  
Add to Cart

Share |

Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Hsinchun Chen ,  Reagan Moore ,  Daniel D. Zeng ,  John Leavitt
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2004 ed.
Volume:   3073
Dimensions:   Width: 15.50cm , Height: 2.90cm , Length: 23.50cm
Weight:   1.720kg
ISBN:  

9783540221258


ISBN 10:   3540221255
Pages:   544
Publication Date:   01 June 2004
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Full Papers.- Aligning Simulation Models of Smallpox Outbreaks.- Data Analytics for Bioterrorism Surveillance.- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics.- A Novel Policy and Information Flow Security Model for Active Network.- A Novel Autonomous Trust Management Model for Mobile Agents.- Privacy-Preserving Inter-database Operations.- Finding Unusual Correlation Using Matrix Decompositions.- Generating Concept Hierarchies from Text for Intelligence Analysis.- Interactive Query Languages for Intelligence Tasks.- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.- The Architecture of the Cornell Knowledge Broker.- Computer-Based Training for Deception Detection: What Users Want?.- Identifying Multi-ID Users in Open Forums.- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training.- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.- Critical Infrastructure Integration Modeling and Simulation.- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection.- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks.- A Tool for Internet Chatroom Surveillance.- ChatTrack: Chat Room Topic Detection Using Classification.- SECRETS: A Secure Real-Time Multimedia Surveillance System.- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information.- THEMIS: Threat Evaluation Metamodel for Information Systems.- Balancing Security and Privacy in the 21 st Century.- IT Security Risk Management under Network Effects and Layered Protection Strategy.- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations.- Analyzing and Visualizing Criminal Network Dynamics: A Case Study.- Discovering Hidden Groups in Communication Networks.- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data.- Short Papers.- Using Speech Act Profiling for Deception Detection.- Testing Various Modes of Computer-Based Training for Deception Detection.- The Use of Data Mining Techniques in Operational Crime Fighting.- Spatial Forecast Methods for Terrorist Events in Urban Environments.- Web-Based Intelligence Notification System: Architecture and Design.- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network.- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data.- Information Sharing and Collaboration Policies within Government Agencies.- Intrusion-Tolerant Intrusion Detection System.- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy.- Semantic Analysis for Monitoring Insider Threats.- Towards a Social Network Approach for Monitoring Insider Threats to Information Security.- Extended Abstracts for Posters.- Policy-Based Information Sharing with Semantics.- Determining the Gender of the Unseen Name through Hyphenation.- A Framework for a Secure Federated Patient Healthcare System.- Vulnerability Analysis and Evaluation within an Intranet.- Security Informatics: A Paradigm Shift in Information Technology Education.- Research of Characteristics of Worm Traffic.- Panel Discussion Papers.- MIPT: Sharing Terrorism Information Resources.- Post-9/11 Evolution of Al Qaeda.- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List