Coverart for item
The Resource Intelligence and Security Informatics : European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, edited by Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Zeng, David L. Hicks, Gerhard Wagner, (electronic resource)

Intelligence and Security Informatics : European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, edited by Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Zeng, David L. Hicks, Gerhard Wagner, (electronic resource)

Label
Intelligence and Security Informatics : European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings
Title
Intelligence and Security Informatics
Title remainder
European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings
Statement of responsibility
edited by Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Zeng, David L. Hicks, Gerhard Wagner
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, EuroISI 2008, held in Esbjerg, Denmark, in December 2008. The 23 revised full papers and 2 revised poster papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on criminal and social network analysis, intelligence analysis and knowledge discovery, Web-based intelligence monitoring and analysis, privacy protection, access control, and digital rights management, malware and intrusion detection, as well as surveillance and crisis management
Member of
Is Subseries of
http://bibfra.me/vocab/relation/corporateauthor
pCWGwalgsRw
Dewey number
005.8
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • HApcCO_RDkc
  • 5Kp_YZLHTkw
  • MbtKcpyIkyQ
  • sNSUQ_wJBTk
  • FRcGpV7O0WM
Image bit depth
0
Language note
English
LC call number
TK7885-7895
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2008
http://bibfra.me/vocab/lite/meetingName
EuroISI 2008
Nature of contents
dictionaries
http://bibfra.me/vocab/lite/organizationName
EuroISI 2008
http://library.link/vocab/relatedWorkOrContributorName
  • EuroISI 2008
  • Ortiz-Arroyo, Daniel.
  • Larsen, Henrik Legind.
  • Zeng, Daniel.
  • Hicks, David L.
  • Wagner, Gerhard.
Series statement
Information Systems and Applications, incl. Internet/Web, and HCI
Series volume
5376
http://library.link/vocab/subjectName
  • Computer Communication Networks
  • Data mining
  • Computer science
  • Computers
  • Computer Engineering
  • Computer Communication Networks
  • Data Mining and Knowledge Discovery
  • Information Systems Applications (incl. Internet)
  • Computers and Society
  • Legal Aspects of Computing
Label
Intelligence and Security Informatics : European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, edited by Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Zeng, David L. Hicks, Gerhard Wagner, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Abstracts of Plenary Talks -- Intelligent Social Network Modeling and Analysis for Security Informatics -- Nature Inspired Online Real Risk Assessment Models for Security Systems -- Homeland Security Data Mining Using Social Network Analysis -- Criminal and Social Network Analysis -- The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data -- An Information Theory Approach to Identify Sets of Key Players -- Locating Key Actors in Social Networks Using Bayes’ Posterior Probability Framework -- Computational Modeling of Criminal Activity -- Intelligence Analysis and Knowledge Discovery -- SPYWatch, Overcoming Linguistic Barriers in Information Management -- Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary -- Buzz Monitoring in Word Space -- Web-Based Intelligence Monitoring and Analysis -- Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study -- Mapping Dark Web Geolocation -- Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study -- Privacy Protection, Access Control, and Digital Rights Management -- Access Control of Federated Information Systems -- Designing Information Systems Which Manage or Avoid Privacy Incidents -- Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication -- Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transform -- Problem Analyses and Recommendations in DRM Security Policies -- Malware and Intrusion Detection -- A Distributed Framework for the Detection of New Worm-Related Malware -- Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures -- Unknown Malcode Detection Using OPCODE Representation -- Surveillance and Crisis Management -- Mobile and Stationary Sensors for Local Surveillance: System Architecture and Applications -- Fuzzy Distributed Workflows for Crisis Management Decision Makers -- Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms -- An Information Systems Design Theory for Supporting WMD Knowledge Reachback -- Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation -- Posters -- Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns -- Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
Dimensions
unknown
Edition
1st ed. 2008.
Extent
1 online resource (XI, 277 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540899006
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-89900-6
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000545832
  • (SSID)ssj0000318359
  • (PQKBManifestationID)11265159
  • (PQKBTitleCode)TC0000318359
  • (PQKBWorkID)10307470
  • (PQKB)11165433
  • (DE-He213)978-3-540-89900-6
  • (MiAaPQ)EBC3063797
  • (EXLCZ)991000000000545832
Label
Intelligence and Security Informatics : European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings, edited by Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Zeng, David L. Hicks, Gerhard Wagner, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Abstracts of Plenary Talks -- Intelligent Social Network Modeling and Analysis for Security Informatics -- Nature Inspired Online Real Risk Assessment Models for Security Systems -- Homeland Security Data Mining Using Social Network Analysis -- Criminal and Social Network Analysis -- The Automatic Identification and Prioritisation of Criminal Networks from Police Crime Data -- An Information Theory Approach to Identify Sets of Key Players -- Locating Key Actors in Social Networks Using Bayes’ Posterior Probability Framework -- Computational Modeling of Criminal Activity -- Intelligence Analysis and Knowledge Discovery -- SPYWatch, Overcoming Linguistic Barriers in Information Management -- Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary -- Buzz Monitoring in Word Space -- Web-Based Intelligence Monitoring and Analysis -- Nuclear Threat Detection Via the Nuclear Web and Dark Web: Framework and Preliminary Study -- Mapping Dark Web Geolocation -- Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study -- Privacy Protection, Access Control, and Digital Rights Management -- Access Control of Federated Information Systems -- Designing Information Systems Which Manage or Avoid Privacy Incidents -- Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication -- Digital Audio Watermarking for Copyright Protection Based on Multiwavelet Transform -- Problem Analyses and Recommendations in DRM Security Policies -- Malware and Intrusion Detection -- A Distributed Framework for the Detection of New Worm-Related Malware -- Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures -- Unknown Malcode Detection Using OPCODE Representation -- Surveillance and Crisis Management -- Mobile and Stationary Sensors for Local Surveillance: System Architecture and Applications -- Fuzzy Distributed Workflows for Crisis Management Decision Makers -- Reconfigurable Radio Systems for Public Safety Based on Low-Cost Platforms -- An Information Systems Design Theory for Supporting WMD Knowledge Reachback -- Rampart: A Service and Agent-Based Architecture for Anti-Terrorism Planning and Resource Allocation -- Posters -- Evaluative Word Locations in Semantic Networks from News Stories about Al Qaeda and Implications for Optimal Communication Messages in Anti-terrorism Campaigns -- Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
Dimensions
unknown
Edition
1st ed. 2008.
Extent
1 online resource (XI, 277 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540899006
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/978-3-540-89900-6
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000545832
  • (SSID)ssj0000318359
  • (PQKBManifestationID)11265159
  • (PQKBTitleCode)TC0000318359
  • (PQKBWorkID)10307470
  • (PQKB)11165433
  • (DE-He213)978-3-540-89900-6
  • (MiAaPQ)EBC3063797
  • (EXLCZ)991000000000545832

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...