000 07186nam a22006855i 4500
001 978-3-540-33362-3
003 DE-He213
005 20240423130158.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 _a9783540333623
_9978-3-540-33362-3
024 7 _a10.1007/11734628
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM005000
_2bisacsh
072 7 _aUX
_2thema
082 0 4 _a005.3
_223
245 1 0 _aIntelligence and Security Informatics
_h[electronic resource] :
_bInternational Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings /
_cedited by Hsinchun Chen, Feiyue Wang, Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXII, 188 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v3917
505 0 _aKeynote Speech -- Data Mining for Security Applications -- Web and Text Mining for Terrorism Informatics -- Unraveling International Terrorist Groups’ Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity -- Multi-lingual Detection of Terrorist Content on the Web -- INEXT: An Investigative Search Tool for Knowledge Extraction -- Cybercrime Analysis -- Cybercrime in Taiwan – An Analysis of Suspect Records -- Analysis of Computer Crime Characteristics in Taiwan -- A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination -- Network Security -- Detecting Novel Network Attacks with a Data Field -- Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication -- Illegal Intrusion Detection Based on Hidden Information Database -- Defender Personality Traits -- Crime Data Mining -- Mining Criminal Databases to Finding Investigation Clues—By Example of Stolen Automobiles Database -- Country Corruption Analysis with Self Organizing Maps and Support Vector Machines -- Temporal Representation in Spike Detection of Sparse Personal Identity Streams -- Mining Positive Associations of Urban Criminal Activities Using Hierarchical Crime Hot Spots -- VCCM Mining: Mining Virtual Community Core Members Based on Gene Expression Programming -- Posters -- Integration of a Cryptographic File System and Access Control -- Applications of Homomorphic Functions to Software Obfuscation -- Security Model for Informational Privacy -- A Viable System for Tracing Illegal Users of Video -- Privacy and Security Enhanced Offline Oblivious Transfer for Massive Data Distribution -- The Effectiveness of Artificial Rhythms and Cues in Keystroke Dynamics Based User Authentication.-Cascade Damage Estimation Model for Internet Attacks -- A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting -- A Fuzzy Anomaly Detection System -- Hidden Markov Model Based Intrusion Detection -- One-Class Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks -- A Novel Identity Authentication Technique Without Trustworthy Third-Party Based on Fingerprint Verification -- Cyberspace Community Analysis and Simulation Using Complex Dynamic Social Networks -- Analysis of Infectious Disease Data Based on Evolutionary Computation -- Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis -- A Computational Framework for Decision Analysis and Support in ISI: Artificial Societies, Computational Experiments, and Parallel Systems.
520 _aIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception detection, terrorist and criminal social network analysis, crime analysis, monitoring and surveillance, policy studies and evaluation, and information assurance, among others. We continued these stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI 2006) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006). WISI 2006 provided a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. WISI 2006 was hosted by the Chinese University of Hong Kong, the University of Arizona, the Nanyang Technological University, and the Chinese Academy of Sciences. The one-day program included one keynote speech, four refereed paper sessions, two invited sessions and a poster reception.
650 0 _aApplication software.
650 0 _aInformation storage and retrieval systems.
650 0 _aComputer networks .
650 0 _aComputers and civilization.
650 0 _aComputers
_xLaw and legislation.
650 0 _aInformation technology
_xLaw and legislation.
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aComputer and Information Systems Applications.
650 2 4 _aInformation Storage and Retrieval.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputers and Society.
650 2 4 _aLegal Aspects of Computing.
650 2 4 _aIT Operations.
700 1 _aChen, Hsinchun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWang, Feiyue.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aYang, Christopher C.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aZeng, Daniel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aChau, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aChang, Kuiyu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540333616
776 0 8 _iPrinted edition:
_z9783540822608
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v3917
856 4 0 _uhttps://doi.org/10.1007/11734628
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c185894
_d185894