LEADER 08985nam 22008895 450 001 996466229103316 005 20200706140634.0 010 $a1-280-30775-7 010 $a9786610307753 010 $a3-540-25952-X 024 7 $a10.1007/b98042 035 $a(CKB)1000000000212402 035 $a(DE-He213)978-3-540-25952-7 035 $a(SSID)ssj0000180564 035 $a(PQKBManifestationID)11154681 035 $a(PQKBTitleCode)TC0000180564 035 $a(PQKBWorkID)10149924 035 $a(PQKB)10351406 035 $a(MiAaPQ)EBC3088029 035 $a(PPN)155208160 035 $a(EXLCZ)991000000000212402 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntelligence and Security Informatics$b[electronic resource] $eSecond Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings /$fedited by Hsinchun Chen, Reagan Moore, Daniel D. Zeng, John Leavitt 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (XVI, 544 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v3073 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-22125-5 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aFull Papers -- Aligning Simulation Models of Smallpox Outbreaks -- Data Analytics for Bioterrorism Surveillance -- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics -- A Novel Policy and Information Flow Security Model for Active Network -- A Novel Autonomous Trust Management Model for Mobile Agents -- Privacy-Preserving Inter-database Operations -- Finding Unusual Correlation Using Matrix Decompositions -- Generating Concept Hierarchies from Text for Intelligence Analysis -- Interactive Query Languages for Intelligence Tasks -- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism -- The Architecture of the Cornell Knowledge Broker -- Computer-Based Training for Deception Detection: What Users Want? -- Identifying Multi-ID Users in Open Forums -- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training -- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats -- Critical Infrastructure Integration Modeling and Simulation -- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection -- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks -- A Tool for Internet Chatroom Surveillance -- ChatTrack: Chat Room Topic Detection Using Classification -- SECRETS: A Secure Real-Time Multimedia Surveillance System -- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information -- THEMIS: Threat Evaluation Metamodel for Information Systems -- Balancing Security and Privacy in the 21 st Century -- IT Security Risk Management under Network Effects and Layered Protection Strategy -- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations -- Analyzing and Visualizing Criminal Network Dynamics: A Case Study -- Discovering Hidden Groups in Communication Networks -- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data -- Short Papers -- Using Speech Act Profiling for Deception Detection -- Testing Various Modes of Computer-Based Training for Deception Detection -- The Use of Data Mining Techniques in Operational Crime Fighting -- Spatial Forecast Methods for Terrorist Events in Urban Environments -- Web-Based Intelligence Notification System: Architecture and Design -- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network -- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data -- Information Sharing and Collaboration Policies within Government Agencies -- Intrusion-Tolerant Intrusion Detection System -- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy -- Semantic Analysis for Monitoring Insider Threats -- Towards a Social Network Approach for Monitoring Insider Threats to Information Security -- Extended Abstracts for Posters -- Policy-Based Information Sharing with Semantics -- Determining the Gender of the Unseen Name through Hyphenation -- A Framework for a Secure Federated Patient Healthcare System -- Vulnerability Analysis and Evaluation within an Intranet -- Security Informatics: A Paradigm Shift in Information Technology Education -- Research of Characteristics of Worm Traffic -- Panel Discussion Papers -- MIPT: Sharing Terrorism Information Resources -- Post-9/11 Evolution of Al Qaeda -- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. 330 $aThe past two years have seen signi?cant interest and progress made in national and homeland security research in the areas of information technologies, orga- zational studies, and security-related public policy. Like medical and biological research, which is facing signi?cant information overload and yet also trem- dous opportunities for new innovation, the communities of law enforcement, criminal analysis, and intelligence are facing the same challenge. As medical - formatics and bioinformatics have become major ?elds of study, the science of ?intelligence and security informatics? is now emerging and attracting interest from academic researchers in related ?elds as well as practitioners from both government agencies and industry. Broadly de?ned, intelligence and security informatics is the study of the - velopmentanduseofadvancedinformationtechnologiesandsystemsfornational and homeland security related applications, through an integrated technological, organizational, and policy based approach. The First Symposium on Intelligence and Security Informatics (ISI2003) was held in June 2003 in Tucson, Arizona. It provided a stimulating intellectual forum of discussions among previously d- paratecommunities:academicresearchersininformationtechnologies,computer science, public policy, and social studies; local, state, and federal law enfor- ment and intelligence experts; and information technology industry consultants and practitioners. Building on the momentum of ISI2003, we held the Second Symposium on IntelligenceandSecurityInformatics(ISI2004)inJune2004inTucson,Arizona. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v3073 606 $aArtificial intelligence 606 $aApplication software 606 $aInformation storage and retrieval 606 $aOperating systems (Computers) 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aInformation storage and retrieval. 615 0$aOperating systems (Computers). 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aArtificial Intelligence. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aInformation Storage and Retrieval. 615 24$aOperating Systems. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 676 $a006.3/3 702 $aChen$b Hsinchun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMoore$b Reagan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZeng$b Daniel D$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLeavitt$b John$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSymposium on Intelligence and Security Informatics 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466229103316 996 $aIntelligence and Security Informatics$9771944 997 $aUNISA