04734nam 22008055 450 991048472100332120200705160524.03-540-34479-910.1007/11760146(CKB)1000000000232992(SSID)ssj0000318364(PQKBManifestationID)11266636(PQKBTitleCode)TC0000318364(PQKBWorkID)10310238(PQKB)11074143(DE-He213)978-3-540-34479-7(MiAaPQ)EBC3068183(PPN)123135265(EXLCZ)99100000000023299220100506d2006 u| 0engurnn#008mamaatxtccrIntelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. /edited by Sharad Mehrotra, Daniel D. Zeng, Hsinchun Chen1st ed. 2006.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2006.1 online resource (XXII, 778 p.)Information Systems and Applications, incl. Internet/Web, and HCI ;3975Bibliographic Level Mode of Issuance: Monograph3-540-34478-0 Includes bibliographical references and index.Long Papers -- Short Papers -- Extended Abstracts for Posters and Demos.In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conf- ence series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California, in May 2006. In addition to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and infor- tion technologies and tools.Information Systems and Applications, incl. Internet/Web, and HCI ;3975Data encryption (Computer science)Application softwareInformation storage and retrievalComputer communication systemsComputers and civilizationComputersLaw and legislationCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Data encryption (Computer science).Application software.Information storage and retrieval.Computer communication systems.Computers and civilization.Computers.Law and legislation.Cryptology.Information Systems Applications (incl. Internet).Information Storage and Retrieval.Computer Communication Networks.Computers and Society.Legal Aspects of Computing.005.74Mehrotra Sharadedthttp://id.loc.gov/vocabulary/relators/edtZeng Daniel Dedthttp://id.loc.gov/vocabulary/relators/edtChen Hsinchunedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910484721003321Intelligence and Security Informatics771944UNINA