The Resource Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.)
Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.)
Resource Information
The item Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 1 library branch.
- Summary
- This book constitutes the refereed proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, held in Tucson, AZ, USA in June 2004. The 29 revised full papers and 12 revised short papers presented together with 6 extended abstracts of posters and 3 panel discussion summaries were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on bioterrorism and disease informatics; data access, privacy, and trust management; data management and mining; deception detection; information assurance and infrastructure protection; monitoring and surveillance; security policies and evaluation; and social network analysis
- Language
- eng
- Extent
- 1 online resource (xv, 536 pages)
- Contents
-
- Full Papers
- Aligning Simulation Models of Smallpox Outbreaks
- Data Analytics for Bioterrorism Surveillance
- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics
- A Novel Policy and Information Flow Security Model for Active Network
- A Novel Autonomous Trust Management Model for Mobile Agents
- Privacy-Preserving Inter-database Operations
- Finding Unusual Correlation Using Matrix Decompositions
- Generating Concept Hierarchies from Text for Intelligence Analysis
- Interactive Query Languages for Intelligence Tasks
- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism
- The Architecture of the Cornell Knowledge Broker
- Computer-Based Training for Deception Detection: What Users Want?
- Identifying Multi-ID Users in Open Forums
- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training
- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
- Critical Infrastructure Integration Modeling and Simulation
- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection
- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks
- A Tool for Internet Chatroom Surveillance
- ChatTrack: Chat Room Topic Detection Using Classification
- SECRETS: A Secure Real-Time Multimedia Surveillance System
- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information
- THEMIS: Threat Evaluation Metamodel for Information Systems
- Balancing Security and Privacy in the 21 st Century
- IT Security Risk Management under Network Effects and Layered Protection Strategy
- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations
- Analyzing and Visualizing Criminal Network Dynamics: A Case Study
- Discovering Hidden Groups in Communication Networks
- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data
- Short Papers
- Using Speech Act Profiling for Deception Detection
- Testing Various Modes of Computer-Based Training for Deception Detection
- The Use of Data Mining Techniques in Operational Crime Fighting
- Spatial Forecast Methods for Terrorist Events in Urban Environments
- Web-Based Intelligence Notification System: Architecture and Design
- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network
- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data
- Information Sharing and Collaboration Policies within Government Agencies
- Intrusion-Tolerant Intrusion Detection System
- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy
- Semantic Analysis for Monitoring Insider Threats
- Towards a Social Network Approach for Monitoring Insider Threats to Information Security
- Extended Abstracts for Posters
- Policy-Based Information Sharing with Semantics
- Determining the Gender of the Unseen Name through Hyphenation
- A Framework for a Secure Federated Patient Healthcare System
- Vulnerability Analysis and Evaluation within an Intranet
- Security Informatics: A Paradigm Shift in Information Technology Education
- Research of Characteristics of Worm Traffic
- Panel Discussion Papers
- MIPT: Sharing Terrorism Information Resources
- Post-9/11 Evolution of Al Qaeda
- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism
- Isbn
- 9783540259527
- Label
- Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings
- Title
- Intelligence and security informatics
- Title remainder
- Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings
- Statement of responsibility
- Hsinchun Chen [and others] (eds.)
- Title variation
- ISI 2004
- Subject
-
- Computer security
- Computer security
- Computer security -- United States -- Congresses
- Computersicherheit
- Conference papers and proceedings
- Conference papers and proceedings
- Data Mining
- Data mining
- Data mining
- Data mining -- United States -- Congresses
- Datenbankverwaltung
- Datensicherung
- Expert systems (Computer science)
- Expert systems (Computer science)
- Expert systems (Computer science) -- United States -- Congresses
- Exploration de données
- Innere Sicherheit
- Intelligentes Netz
- Kriminalpolitik
- Monitoring
- National security
- National security
- National security -- United States -- Congresses
- Système expert
- Sécurité informatique
- Sécurité nationale
- United States
- United States
- États-Unis
- COMPUTERS -- Expert Systems
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, held in Tucson, AZ, USA in June 2004. The 29 revised full papers and 12 revised short papers presented together with 6 extended abstracts of posters and 3 panel discussion summaries were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on bioterrorism and disease informatics; data access, privacy, and trust management; data management and mining; deception detection; information assurance and infrastructure protection; monitoring and surveillance; security policies and evaluation; and social network analysis
- Cataloging source
- COO
- Dewey number
- 006.3/3
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.76.E95
- LC item number
- S9175 2004
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2004
- http://bibfra.me/vocab/lite/meetingName
- Symposium on Intelligence and Security Informatics
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Chen, Hsinchun
- Series statement
- Lecture notes in computer science,
- Series volume
- 3073
- http://library.link/vocab/subjectName
-
- Expert systems (Computer science)
- Data mining
- Computer security
- National security
- COMPUTERS
- Computer security
- Data mining
- Expert systems (Computer science)
- National security
- United States
- Computersicherheit
- Data Mining
- Datenbankverwaltung
- Datensicherung
- Innere Sicherheit
- Intelligentes Netz
- Kriminalpolitik
- Monitoring
- Système expert
- Exploration de données
- Sécurité informatique
- Sécurité nationale
- États-Unis
- Label
- Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Full Papers -- Aligning Simulation Models of Smallpox Outbreaks -- Data Analytics for Bioterrorism Surveillance -- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics -- A Novel Policy and Information Flow Security Model for Active Network -- A Novel Autonomous Trust Management Model for Mobile Agents -- Privacy-Preserving Inter-database Operations -- Finding Unusual Correlation Using Matrix Decompositions -- Generating Concept Hierarchies from Text for Intelligence Analysis -- Interactive Query Languages for Intelligence Tasks -- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism -- The Architecture of the Cornell Knowledge Broker -- Computer-Based Training for Deception Detection: What Users Want? -- Identifying Multi-ID Users in Open Forums -- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training -- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats -- Critical Infrastructure Integration Modeling and Simulation -- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection -- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks -- A Tool for Internet Chatroom Surveillance -- ChatTrack: Chat Room Topic Detection Using Classification -- SECRETS: A Secure Real-Time Multimedia Surveillance System -- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information -- THEMIS: Threat Evaluation Metamodel for Information Systems -- Balancing Security and Privacy in the 21 st Century -- IT Security Risk Management under Network Effects and Layered Protection Strategy -- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations -- Analyzing and Visualizing Criminal Network Dynamics: A Case Study -- Discovering Hidden Groups in Communication Networks -- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data -- Short Papers -- Using Speech Act Profiling for Deception Detection -- Testing Various Modes of Computer-Based Training for Deception Detection -- The Use of Data Mining Techniques in Operational Crime Fighting -- Spatial Forecast Methods for Terrorist Events in Urban Environments -- Web-Based Intelligence Notification System: Architecture and Design -- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network -- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data -- Information Sharing and Collaboration Policies within Government Agencies -- Intrusion-Tolerant Intrusion Detection System -- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy -- Semantic Analysis for Monitoring Insider Threats -- Towards a Social Network Approach for Monitoring Insider Threats to Information Security -- Extended Abstracts for Posters -- Policy-Based Information Sharing with Semantics -- Determining the Gender of the Unseen Name through Hyphenation -- A Framework for a Secure Federated Patient Healthcare System -- Vulnerability Analysis and Evaluation within an Intranet -- Security Informatics: A Paradigm Shift in Information Technology Education -- Research of Characteristics of Worm Traffic -- Panel Discussion Papers -- MIPT: Sharing Terrorism Information Resources -- Post-9/11 Evolution of Al Qaeda -- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism
- Control code
- 59552209
- Dimensions
- unknown
- Extent
- 1 online resource (xv, 536 pages)
- Form of item
- online
- Isbn
- 9783540259527
- Lccn
- 2004106662
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- Specific material designation
- remote
- System control number
- (OCoLC)59552209
- Label
- Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Full Papers -- Aligning Simulation Models of Smallpox Outbreaks -- Data Analytics for Bioterrorism Surveillance -- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics -- A Novel Policy and Information Flow Security Model for Active Network -- A Novel Autonomous Trust Management Model for Mobile Agents -- Privacy-Preserving Inter-database Operations -- Finding Unusual Correlation Using Matrix Decompositions -- Generating Concept Hierarchies from Text for Intelligence Analysis -- Interactive Query Languages for Intelligence Tasks -- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism -- The Architecture of the Cornell Knowledge Broker -- Computer-Based Training for Deception Detection: What Users Want? -- Identifying Multi-ID Users in Open Forums -- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training -- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats -- Critical Infrastructure Integration Modeling and Simulation -- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection -- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks -- A Tool for Internet Chatroom Surveillance -- ChatTrack: Chat Room Topic Detection Using Classification -- SECRETS: A Secure Real-Time Multimedia Surveillance System -- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information -- THEMIS: Threat Evaluation Metamodel for Information Systems -- Balancing Security and Privacy in the 21 st Century -- IT Security Risk Management under Network Effects and Layered Protection Strategy -- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations -- Analyzing and Visualizing Criminal Network Dynamics: A Case Study -- Discovering Hidden Groups in Communication Networks -- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data -- Short Papers -- Using Speech Act Profiling for Deception Detection -- Testing Various Modes of Computer-Based Training for Deception Detection -- The Use of Data Mining Techniques in Operational Crime Fighting -- Spatial Forecast Methods for Terrorist Events in Urban Environments -- Web-Based Intelligence Notification System: Architecture and Design -- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network -- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data -- Information Sharing and Collaboration Policies within Government Agencies -- Intrusion-Tolerant Intrusion Detection System -- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy -- Semantic Analysis for Monitoring Insider Threats -- Towards a Social Network Approach for Monitoring Insider Threats to Information Security -- Extended Abstracts for Posters -- Policy-Based Information Sharing with Semantics -- Determining the Gender of the Unseen Name through Hyphenation -- A Framework for a Secure Federated Patient Healthcare System -- Vulnerability Analysis and Evaluation within an Intranet -- Security Informatics: A Paradigm Shift in Information Technology Education -- Research of Characteristics of Worm Traffic -- Panel Discussion Papers -- MIPT: Sharing Terrorism Information Resources -- Post-9/11 Evolution of Al Qaeda -- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism
- Control code
- 59552209
- Dimensions
- unknown
- Extent
- 1 online resource (xv, 536 pages)
- Form of item
- online
- Isbn
- 9783540259527
- Lccn
- 2004106662
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- Specific material designation
- remote
- System control number
- (OCoLC)59552209
Subject
- Computer security
- Computer security
- Computer security -- United States -- Congresses
- Computersicherheit
- Conference papers and proceedings
- Conference papers and proceedings
- Data Mining
- Data mining
- Data mining
- Data mining -- United States -- Congresses
- Datenbankverwaltung
- Datensicherung
- Expert systems (Computer science)
- Expert systems (Computer science)
- Expert systems (Computer science) -- United States -- Congresses
- Exploration de données
- Innere Sicherheit
- Intelligentes Netz
- Kriminalpolitik
- Monitoring
- National security
- National security
- National security -- United States -- Congresses
- Système expert
- Sécurité informatique
- Sécurité nationale
- United States
- United States
- États-Unis
- COMPUTERS -- Expert Systems
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Intelligence-and-security-informatics--Second/5-Vr_vXKK7E/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Intelligence-and-security-informatics--Second/5-Vr_vXKK7E/">Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Intelligence-and-security-informatics--Second/5-Vr_vXKK7E/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Intelligence-and-security-informatics--Second/5-Vr_vXKK7E/">Intelligence and security informatics : Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004 : proceedings, Hsinchun Chen [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>