Coverart for item
The Resource Intelligence and Security Informatics : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, (electronic resource)

Intelligence and Security Informatics : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, (electronic resource)

Label
Intelligence and Security Informatics : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings
Title
Intelligence and Security Informatics
Title remainder
International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings
Statement of responsibility
edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Summary
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception detection, terrorist and criminal social network analysis, crime analysis, monitoring and surveillance, policy studies and evaluation, and information assurance, among others. We continued these stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI 2006) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). WISI 2006 provided a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. WISI 2006 was hosted by the Chinese University of Hong Kong, the University of Arizona, the Nanyang Technological University, and the Chinese Academy of Sciences. The one-day program included one keynote speech, four refereed paper sessions, two invited sessions and a poster reception
Member of
Is Subseries of
Dewey number
005.7
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • uUK1ZVQRzPM
  • CXduQImR8cg
  • gWE2ddqtL8M
  • MbtKcpyIkyQ
  • 95goth7w2FM
  • zXQ_Hxiq-ss
Image bit depth
0
Language note
English
LC call number
QA76.76.A65
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2006
http://bibfra.me/vocab/lite/meetingName
WISI 2006
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Chen, Hsinchun.
  • Wang, Feiyue.
  • Yang, Christopher C.
  • Zeng, Daniel.
  • Chau, Michael.
  • Chang, Kuiyu.
Series statement
Information Systems and Applications, incl. Internet/Web, and HCI
Series volume
3917
http://library.link/vocab/subjectName
  • Information storage and retrieval systems
  • Computer Communication Networks
  • Computer science
  • Computers
  • Information Systems
  • Information Systems Applications (incl. Internet)
  • Information Storage and Retrieval
  • Computer Communication Networks
  • Computers and Society
  • Legal Aspects of Computing
  • Management of Computing and Information Systems
Label
Intelligence and Security Informatics : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan – An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication -- Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems
Dimensions
unknown
Edition
1st ed. 2006.
Extent
1 online resource (XII, 188 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540333623
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/11734628
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000232921
  • (SSID)ssj0000318363
  • (PQKBManifestationID)11241977
  • (PQKBTitleCode)TC0000318363
  • (PQKBWorkID)10310390
  • (PQKB)10459308
  • (DE-He213)978-3-540-33362-3
  • (MiAaPQ)EBC3067750
  • (EXLCZ)991000000000232921
Label
Intelligence and Security Informatics : International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, edited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Color
not applicable
Content category
text
Content type code
  • txt
Contents
Keynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan – An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication -- Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems
Dimensions
unknown
Edition
1st ed. 2006.
Extent
1 online resource (XII, 188 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540333623
Level of compression
uncompressed
Media category
computer
Media type code
  • c
Other control number
10.1007/11734628
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000232921
  • (SSID)ssj0000318363
  • (PQKBManifestationID)11241977
  • (PQKBTitleCode)TC0000318363
  • (PQKBWorkID)10310390
  • (PQKB)10459308
  • (DE-He213)978-3-540-33362-3
  • (MiAaPQ)EBC3067750
  • (EXLCZ)991000000000232921

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...