Cargando…

Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings /

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Chen, Hsinchun (Editor ), Wang, Feiyue (Editor ), Yang, Christopher C. (Editor ), Zeng, Daniel (Editor ), Chau, Michael (Editor ), Chang, Kuiyu (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 3917
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Keynote Speech
  • Data Mining for Security Applications
  • Web and Text Mining for Terrorism Informatics
  • Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity
  • Multi-lingual Detection of Terrorist Content on the Web
  • INEXT: An Investigative Search Tool for Knowledge Extraction
  • Cybercrime Analysis
  • Cybercrime in Taiwan - An Analysis of Suspect Records
  • Analysis of Computer Crime Characteristics in Taiwan
  • A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination
  • Network Security
  • Detecting Novel Network Attacks with a Data Field
  • Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication
  • Illegal Intrusion Detection Based on Hidden Information Database
  • Defender Personality Traits
  • Crime Data Mining
  • Mining Criminal Databases to Finding Investigation Clues-By Example of Stolen Automobiles Database
  • Country Corruption Analysis with Self Organizing Maps and Support Vector Machines
  • Temporal Representation in Spike Detection of Sparse Personal Identity Streams
  • Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots
  • VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming
  • Posters
  • Integration of a Cryptographic File System and Access Control
  • Applications of Homomorphic Functions to Software Obfuscation
  • Security Model for Informational Privacy
  • A Viable System for Tracing Illegal Users of Video
  • Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution
  • The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication
  • Cascade Damage Estimation Model for Internet Attacks
  • A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting
  • A Fuzzy Anomaly Detection System
  • Hidden Markov Model Based Intrusion Detection
  • One-Class Strategies for Security Information Detection
  • Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks
  • A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification
  • Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks
  • Analysis of Infectious Disease Data Based on Evolutionary Computation
  • Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis
  • A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.