


default search action
2nd ISI 2004: Tucson, AZ, USA
- Hsinchun Chen, Reagan W. Moore, Daniel Dajun Zeng, John Leavitt:

Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings. Lecture Notes in Computer Science 3073, Springer 2004, ISBN 978-3-540-22125-8
Full Papers
Bioterrorism and Disease Informatics
- Li-Chiou Chen, Boris Kaminsky, Tiffany Tummino, Kathleen M. Carley, Elizabeth Casman, Douglas B. Fridsma, Alex Yahja:

Aligning Simulation Models of Smallpox Outbreaks. 1-16 - Donald J. Berndt

, Sunil Bhat, John W. Fisher, Alan R. Hevner, James Studnicki:
Data Analytics for Bioterrorism Surveillance. 17-27 - Daniel Dajun Zeng, Hsinchun Chen, Chunju Tseng, Catherine A. Larson, Millicent Eidson, Ivan Gotham, Cecil Lynch, Michael Ascher:

West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics. 28-41
Data Access Control, Privacy, and Trust Management
- Zhengyou Xia, Yichuan Jiang, YiPing Zhong, Shiyong Zhang:

A Novel Policy and Information Flow Security Model for Active Network. 42-55 - Yichuan Jiang, Zhengyou Xia, YiPing Zhong, Shiyong Zhang:

A Novel Autonomous Trust Management Model for Mobile Agents. 56-65 - Gang Liang, Sudarshan S. Chawathe:

Privacy-Preserving Inter-database Operations. 66-82
Data Management and Mining
- David B. Skillicorn

:
Finding Unusual Correlation Using Matrix Decompositions. 83-99 - Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, Lee-Feng Chien:

Generating Concept Hierarchies from Text for Intelligence Analysis. 100-113 - Antonio Badia

:
Interactive Query Languages for Intelligence Tasks. 114-124 - Edna Reid, Jialun Qin, Wingyan Chung, Jennifer Jie Xu, Yilu Zhou, Robert P. Schumaker, Marc Sageman, Hsinchun Chen:

Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. 125-145 - Alan J. Demers, Johannes Gehrke

, Mirek Riedewald:
The Architecture of the Cornell Knowledge Broker. 146-162
Deception Detection
- Jinwei Cao, Ming Lin, Amit V. Deokar

, Judee K. Burgoon, Janna M. Crews, Mark Adkins:
Computer-Based Training for Deception Detection: What Users Want? 163-175 - Hung-Ching Chen, Mark K. Goldberg, Malik Magdon-Ismail:

Identifying Multi-ID Users in Open Forums. 176-186 - Kent Marett, David P. Biros, Monti L. Knode:

Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. 187-200
Information Assurance and Infrastructure Protection
- Joon S. Park, Shuyuan Mary Ho:

Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. 201-213 - William J. Tolone, David Wilson, Anita Raja, Wei-Ning Xiang, Huili Hao, Stuart Phelps, E. Wray Johnson:

Critical Infrastructure Integration Modeling and Simulation. 214-225 - Xiangyang Li, Nong Ye:

Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. 226-238 - Enock Chisonge Mofya, Jonathan Cole Smith:

The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks. 239-251
Monitoring and Surveillance
- Seyit Ahmet Çamtepe

, Mukkai S. Krishnamoorthy, Bülent Yener:
A Tool for Internet Chatroom Surveillance. 252-265 - Jason Bengel, Susan Gauch, Eera Mittur, Rajan Vijayaraghavan:

ChatTrack: Chat Room Topic Detection Using Classification. 266-277 - Naren Kodali, Csilla Farkas, Duminda Wijesekera:

SECRETS: A Secure Real-Time Multimedia Surveillance System. 278-296 - Petros Drineas, Mukkai S. Krishnamoorthy, Michael D. Sofka, Bülent Yener:

Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information. 297-306 - Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera:

THEMIS: Threat Evaluation Metamodel for Information Systems. 307-321
Security Policies and Evaluation
- Chris C. Demchak, Kurt D. Fenstermacher:

Balancing Security and Privacy in the 21 st Century. 322-330 - Wei T. Yue, Metin Çakanyildirim, Young U. Ryu, Dengpan Liu:

IT Security Risk Management under Network Effects and Layered Protection Strategy. 331-348 - Gene I. Rochlin:

Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations. 349-358
Social Network Analysis
- Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, Hsinchun Chen:

Analyzing and Visualizing Criminal Network Dynamics: A Case Study. 359-377 - Jeffrey Baumes, Mark K. Goldberg, Malik Magdon-Ismail, William A. Wallace:

Discovering Hidden Groups in Communication Networks. 378-389 - Ju-Sung Lee:

Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data. 390-402
Short Papers
Deception Detection
- Douglas P. Twitchell, Jay F. Nunamaker Jr., Judee K. Burgoon:

Using Speech Act Profiling for Deception Detection. 403-410 - Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:

Testing Various Modes of Computer-Based Training for Deception Detection. 411-417
Data/Text Management and Mining
- Richard Adderley:

The Use of Data Mining Techniques in Operational Crime Fighting. 418-425 - Donald E. Brown, Jason Dalton, Heidi Hoyle:

Spatial Forecast Methods for Terrorist Events in Urban Environments. 426-435 - Alexander Dolotov, Mary Strickler:

Web-Based Intelligence Notification System: Architecture and Design. 436-448 - Christopher C. Yang, Kar Wing Li:

Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network. 449-456
Information Assurance and Infrastructure Protection
- Jorge Levera, Benjamín Barán, Robert L. Grossman:

Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data. 457-466 - Homa Atabakhsh, Cathy Larson, Tim Petersen, Chuck Violette, Hsinchun Chen:

Information Sharing and Collaboration Policies within Government Agencies. 467-475 - Myung-Kyu Yi, Chong-Sun Hwang:

Intrusion-Tolerant Intrusion Detection System. 476-483 - Benjamin B. M. Shao:

Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy. 484-491 - Svetlana Symonenko, Elizabeth D. Liddy, Özgür Yilmazel

, Robert Del Zoppo, Eric Brown, Matt Downey:
Semantic Analysis for Monitoring Insider Threats. 492-500 - Anand Natarajan, Liaquat Hossain:

Towards a Social Network Approach for Monitoring Insider Threats to Information Security. 501-507
Extended Abstracts for Posters
- Eric Hughes, Amy Kazura, Arnie Rosenthal:

Policy-Based Information Sharing with Semantics. 508-509 - Robert H. Warren, Christopher Leurer:

Determining the Gender of the Unseen Name through Hyphenation. 510-511 - Raj Sharman, Himabindu Challapalli, H. Raghav Rao, Shambhu J. Upadhyaya:

A Framework for a Secure Federated Patient Healthcare System. 512-513 - Eung Ki Park, Jung Taek Seo, Eul-Gyu Im, Cheolwon Lee:

Vulnerability Analysis and Evaluation within an Intranet. 514-515 - Susan M. Merritt, Allen Stix, Judith E. Sullivan:

Security Informatics: A Paradigm Shift in Information Technology Education. 516-517 - Yufeng Chen, Yabo Dong, Dongming Lu, Zhengtao Xiang:

Research of Characteristics of Worm Traffic. 518-519
Panel Discussion Papers
- James O. Ellis III:

MIPT: Sharing Terrorism Information Resources. 520-525 - Rohan Kumar Gunaratna:

Post-9/11 Evolution of Al Qaeda. 526-530 - Joshua Sinai:

Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism. 531-533

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














