Coverart for item
The Resource Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings, Hsinchun Chen [and others]

Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings, Hsinchun Chen [and others]

Label
Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings
Title
Intelligence and security informatics
Title remainder
first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings
Statement of responsibility
Hsinchun Chen [and others]
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics, ISI 2003, held in Tucson, AZ, USA in June 2003. The 24 revised full papers and 16 revised short papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on data management and data mining, deception detection, analytical techniques, for crime detection, visualization, knowledge management and adoption, collaborative systems and methodologies, and monitoring and surveillance
Member of
Action
digitized
Cataloging source
COO
Dewey number
006.3/3
Illustrations
illustrations
Index
index present
Language note
English
LC call number
QA76.76.E95
LC item number
I86 2003
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2003
http://bibfra.me/vocab/lite/meetingName
ISI 2003
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Chen, Hsinchun
Series statement
Lecture notes in computer science
Series volume
2665
http://library.link/vocab/subjectName
  • Expert systems (Computer science)
  • Data mining
  • Computer security
  • National security
  • Data mining
  • Systèmes experts (Informatique)
  • Sécurité informatique
  • Sécurité nationale
  • Data mining
  • Computer security
  • National security
  • Expert systems (Computer science)
  • Computer security
  • Data mining
  • Expert systems (Computer science)
  • National security
  • United States
  • Computersicherheit
  • Data Mining
  • Datenbankverwaltung
  • Datensicherung
  • Innere Sicherheit
  • Intelligentes Netz
  • Kriminalpolitik
  • Monitoring
Label
Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings, Hsinchun Chen [and others]
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Full Papers -- Using Support Vector Machines for Terrorism Information Extraction -- Criminal Incident Data Association Using the OLAP Technology -- Names: A New Frontier in Text Mining -- Web-Based Intelligence Reports System -- Authorship Analysis in Cybercrime Investigation -- Behavior Profiling of Email -- Detecting Deception through Linguistic Analysis -- A Longitudinal Analysis of Language Behavior of Deception in E-mail -- Evacuation Planning: A Capacity Constrained Routing Approach -- Locating Hidden Groups in Communication Networks Using Hidden Markov Models -- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department -- Decision Based Spatial Analysis of Crime -- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis -- A Spatio Temporal Visualizer for Law Enforcement -- Tracking Hidden Groups Using Communications -- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study -- "Atrium" -- A Knowledge Model for Modern Security Forces in the Information and Terrorism Age -- Untangling Criminal Networks: A Case Study -- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework -- Collaborative Workflow Management for Interagency Crime Analysis -- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement -- Active Database Systems for Monitoring and Surveillance -- Integrated "Mixed" Networks Security Monitoring -- A Proposed Framework -- Bioterrorism Surveillance with Real-Time Data Warehousing -- Short Papers -- Privacy Sensitive Distributed Data Mining from Multi-party Data -- ProGenIE: Biographical Descriptions for Intelligence Analysis -- Scalable Knowledge Extraction from Legacy Sources with SEEK -- "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features -- Emergent Semantics from Users' Browsing Paths -- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection -- Training Professionals to Detect Deception -- An E-mail Monitoring System for Detecting Outflow of Confidential Documents -- Intelligence and Security Informatics: An Information Economics Perspective -- An International Perspective on Fighting Cybercrime -- Extended Abstracts for Posters -- Hiding Traversal of Tree Structured Data from Untrusted Data Stores -- Criminal Record Matching Based on the Vector Space Model -- Database Support for Exploring Criminal Networks -- Hiding Data and Code Security for Application Hosting Infrastructure -- Secure Information Sharing and Information Retrieval Infrastructure with GridIR -- Semantic Hacking and Intelligence and Security Informatics
Control code
52371126
Dimensions
unknown
Extent
1 online resource (xiv, 392 pages)
Form of item
online
Isbn
9783540448532
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/3-540-44853-5
Other physical details
illustrations.
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
(OCoLC)52371126
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Label
Intelligence and security informatics : first NSF/NIJ symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003 : proceedings, Hsinchun Chen [and others]
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Full Papers -- Using Support Vector Machines for Terrorism Information Extraction -- Criminal Incident Data Association Using the OLAP Technology -- Names: A New Frontier in Text Mining -- Web-Based Intelligence Reports System -- Authorship Analysis in Cybercrime Investigation -- Behavior Profiling of Email -- Detecting Deception through Linguistic Analysis -- A Longitudinal Analysis of Language Behavior of Deception in E-mail -- Evacuation Planning: A Capacity Constrained Routing Approach -- Locating Hidden Groups in Communication Networks Using Hidden Markov Models -- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department -- Decision Based Spatial Analysis of Crime -- CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis -- A Spatio Temporal Visualizer for Law Enforcement -- Tracking Hidden Groups Using Communications -- Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study -- "Atrium" -- A Knowledge Model for Modern Security Forces in the Information and Terrorism Age -- Untangling Criminal Networks: A Case Study -- Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework -- Collaborative Workflow Management for Interagency Crime Analysis -- COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement -- Active Database Systems for Monitoring and Surveillance -- Integrated "Mixed" Networks Security Monitoring -- A Proposed Framework -- Bioterrorism Surveillance with Real-Time Data Warehousing -- Short Papers -- Privacy Sensitive Distributed Data Mining from Multi-party Data -- ProGenIE: Biographical Descriptions for Intelligence Analysis -- Scalable Knowledge Extraction from Legacy Sources with SEEK -- "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features -- Emergent Semantics from Users' Browsing Paths -- Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection -- Training Professionals to Detect Deception -- An E-mail Monitoring System for Detecting Outflow of Confidential Documents -- Intelligence and Security Informatics: An Information Economics Perspective -- An International Perspective on Fighting Cybercrime -- Extended Abstracts for Posters -- Hiding Traversal of Tree Structured Data from Untrusted Data Stores -- Criminal Record Matching Based on the Vector Space Model -- Database Support for Exploring Criminal Networks -- Hiding Data and Code Security for Application Hosting Infrastructure -- Secure Information Sharing and Information Retrieval Infrastructure with GridIR -- Semantic Hacking and Intelligence and Security Informatics
Control code
52371126
Dimensions
unknown
Extent
1 online resource (xiv, 392 pages)
Form of item
online
Isbn
9783540448532
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/3-540-44853-5
Other physical details
illustrations.
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
(OCoLC)52371126
System details
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...