default search action
1st ISI 2003: Tucson, AZ, USA
- Hsinchun Chen, Richard Miranda, Daniel Dajun Zeng, Chris C. Demchak, Jennifer Schroeder, Therani Madhusudan:
Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings. Lecture Notes in Computer Science 2665, Springer 2003, ISBN 3-540-40189-X
Part I: Full Papers
Data Management and Mining
- Aixin Sun, Myo-Myo Naing, Ee-Peng Lim, Wai Lam:
Using Support Vector Machines for Terrorism Information Extraction. 1-12 - Song Lin, Donald E. Brown:
Criminal Incident Data Association Using the OLAP Technology. 13-26 - Frankie Patman, Paul Thompson:
Names: A New Frontier in Text Mining. 27-38 - Alexander Dolotov, Mary Strickler:
Web-Based Intelligence Reports System. 39-58 - Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen:
Authorship Analysis in Cybercrime Investigation. 59-73
Deception Detection
- Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
Behavior Profiling of Email. 74-90 - Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr.:
Detecting Deception through Linguistic Analysis. 91-101 - Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell:
A Longitudinal Analysis of Language Behavior of Deception in E-mail. 102-110
Analytical Techniques
- Qingsong Lu, Yan Huang, Shashi Shekhar:
Evacuation Planning: A Capacity Constrained Routing Approach. 111-125 - Malik Magdon-Ismail, Mark K. Goldberg, William A. Wallace, David Siebecker:
Locating Hidden Groups in Communication Networks Using Hidden Markov Models. 126-137 - Kar Wing Li, Christopher C. Yang:
Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department. 138-152 - Yifei Xue, Donald E. Brown:
Decision Based Spatial Analysis of Crime. 153-167
Visualization
- Jennifer Schroeder, Jennifer Jie Xu, Hsinchun Chen:
CrimeLink Explorer: Using Domain Knowledge to Facilitate Automated Crime Association Analysis. 168-180 - Ty Buetow, Luis G. Chaboya, Christopher D. O'Toole, Tom Cushna, Damien Daspit, Tim Petersen, Homa Atabakhsh, Hsinchun Chen:
A Spatio Temporal Visualizer for Law Enforcement. 181-194 - Sudarshan S. Chawathe:
Tracking Hidden Groups Using Communications. 195-208
Knowledge Management and Adoption
- Paul Jen-Hwa Hu, Chienting Lin, Hsinchun Chen:
Examining Technology Acceptance by Individual Law Enforcement Officers: An Exploratory Study. 209-222 - Chris C. Demchak:
"Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age. 223-231 - Jennifer Jie Xu, Hsinchun Chen:
Untangling Criminal Networks: A Case Study. 232-248
Collaborative Systems and Methodologies
- T. S. Raghu, Ram Ramesh, Andrew B. Whinston:
Addressing the Homeland Security Problem: A Collaborative Decision-Making Framework. 249-265 - J. Leon Zhao, Henry H. Bi, Hsinchun Chen:
Collaborative Workflow Management for Interagency Crime Analysis. 266-280 - Daniel Dajun Zeng, Hsinchun Chen, Damien Daspit, Fu Shan, Suresh Nandiraju, Michael Chau, Chienting Lin:
COPLINK Agent: An Architecture for Information Monitoring and Sharing in Law Enforcement. 281-295
Monitoring and Surveillance
- Antonio Badia:
Active Database Systems for Monitoring and Surveillance. 296-307 - William T. Scherer, Leah L. Spradley, Marc H. Evans:
Integrated "Mixed" Networks Security Monitoring - A Proposed Framework. 308-321 - Donald J. Berndt, Alan R. Hevner, James Studnicki:
Bioterrorism Surveillance with Real-Time Data Warehousing. 322-335
Part II: Short Papers
Data Management and Mining
- Hillol Kargupta, Kun Liu, Jessica Ryan:
Privacy Sensitive Distributed Data Mining from Multi-party Data. 336-342 - Pablo Ariel Duboue, Kathleen R. McKeown, Vasileios Hatzivassiloglou:
PROGENIE: Biographical Descriptions for Intelligence Analysis. 343-345 - Joachim Hammer, William J. O'Brien, Mark S. Schmalz:
Scalable Knowledge Extraction from Legacy Sources with SEEK. 346-349 - Sachin S. Kajarekar, M. Kemal Sönmez, Luciana Ferrer, Venkata Ramana Rao Gadde, Anand Venkataraman, Elizabeth Shriberg, Andreas Stolcke, Harry Bratt:
"TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features. 350-354 - D. V. Sreenath, William I. Grosky, Farshad Fotouhi:
Emergent Semantics from Users' Browsing Paths. 355-357
Deception Detection
- Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. 358-365 - Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Training Professionals to Detect Deception. 366-370 - Bogju Lee, Youna Park:
An E-mail Monitoring System for Detecting Outflow of Confidential Documents. 371-374
Methodologies and Applications
- Lihui Lin, Xianjun Geng, Andrew B. Whinston:
Intelligence and Security Informatics: An Information Economics Perspective. 375-378 - Weiping Chang, Wingyan Chung, Hsinchun Chen, Shihchieh Chou:
An International Perspective on Fighting Cybercrime. 379-384
Part III: Extended Abstracts for Posters
Data Management and Mining
- Ping Lin, K. Selçuk Candan:
Hiding Traversal of Tree Structured Data from Untrusted Data Stores. 385 - Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng:
Criminal Record Matching Based on the Vector Space Model. 386 - Mathew Neville Smith, Peter J. H. King:
Database Support for Exploring Criminal Networks. 387 - Ping Lin, K. Selçuk Candan, Rida A. Bazzi, Zhichao Liu:
Hiding Data and Code Security for Application Hosting Infrastructure. 388
Security Informatics
- Gregory B. Newby, Kevin Gamiel:
Secure Information Sharing and Information Retrieval Infrastructure with GridIR. 389 - Paul Thompson:
Semantic Hacking and Intelligence and Security Informatics (Extended Abstract). 390
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.