-3%
145,95 €
Statt 149,99 €**
145,95 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Gebundenes Buch)
Sofort per Download lieferbar
73 °P sammeln
-3%
145,95 €
Statt 149,99 €**
145,95 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Gebundenes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
73 °P sammeln
Als Download kaufen
Statt 149,99 €**
-3%
145,95 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Gebundenes Buch)
Sofort per Download lieferbar
73 °P sammeln
Jetzt verschenken
Statt 149,99 €**
-3%
145,95 €
inkl. MwSt.
**Preis der gedruckten Ausgabe (Gebundenes Buch)
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
73 °P sammeln
  • Format: PDF


The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 27.97MB
Produktbeschreibung
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

  • Produktdetails
  • Verlag: Springer-Verlag GmbH
  • Seitenzahl: 460
  • Erscheinungstermin: 17. Juni 2008
  • Englisch
  • ISBN-13: 9783540692096
  • Artikelnr.: 44120909
Autorenporträt
Hsinchun Chen is McClelland Professor of Management Information Systems (MIS) at the Eller College of the University of Arizona and Andersen Consulting Professor of the Year (1999). He is the author of 15 books and more than 200 articles covering knowledge management, digital library, homeland security, Web computing, and biomedical informatics in leading information technology publications. He serves on ten editorial boards, including: Journal of the American Society for Information Science and Technology, ACM Transactions on Information Systems, IEEE Transactions on Systems, Man, and Cybernetics, IEEE Transactions on Intelligent Transportation Systems, International Journal of Digital Library, and Decision Support Systems. He has served as a Scientific Advisor/Counselor of the National Library of Medicine (USA), Academia Sinica (Taiwan), and National Library of China (China). Dr. Chen founded The University of Arizona Artificial Intelligence Lab in 1990. The group is distinguished for its applied and high-impact AI research. Since 1990, Dr. Chen has received more than $20M in research funding from various government agencies and major corporations. He has been a PI of the NSF Digital Library Initiative Program and the NIH NLM s Biomedical Informatics Program. His group has developed advanced medical digital library and data and text mining techniques for gene pathway and disease informatics analysis and visualization since 1995. Dr. Chen s nanotechnology patent analysis works, funded by NSF, have been published in the Journal of Nanoparticle Research. His research findings were used in the President s Council of Advisors in Science and Technology s report on "The National Nanotechnology Initiative at Five Years: Assessment and Recommendations of the National Nanotechnology Advisory Panel." Dr. Chen s work also has been recognized by major US corporations and been awarded numerous industry awards for his contribution to IT education and research, including: ATT Foundation Award in Science and Engineering and SAP Award in Research/Applications. Dr. Chen has been heavily involved in fostering digital library, medical informatics, knowledge management, and intelligence informatics research and education in the US and internationally. He has been a PI for more than 20 NSF and NIH research grants since 1990. Dr. Chen is conference chair of ACM/IEEE Joint Conference on Digital Libraries (JCDL) 2004 and has served as the conference general chair or international program committee chair for the past six International Conferences of Asian Digital Libraries (ICADL), 1998-2005. He has been instrumental in fostering the ICADL activities in Asia. Dr. Chen is the founder and also conference co-chair of the IEEE International Conference on Intelligence and Security Informatics (ISI), 2003-2006. The ISI conference has become the premiere meeting for international, national, and homeland security IT research. Dr. Chen is an IEEE fellow.
Inhaltsangabe
Terrorism Informatics and Data Mining.- Assured Information Sharing: Technologies, Challenges and Directions.- Automating Event Extraction for the Security Domain.- Knowledge Discovery and Information Visualization for Terrorist Social Networks.- Understanding the Nexus of Terrorist Web Sites.- Multi-lingual Detection of Web Terrorist Content.- Modeling Anticipatory Event Transitions.- Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan.- Intelligence and Crime Analysis.- Identifying Interesting Networks of Criminal Activity.- Name Matching in Law Enforcement Database.- Discovering Investigation Clues through Mining Criminal Databases.- Automated Filtering on Data Streaming for Intelligence Analysis.- Personal Information Management for Intelligence Tasks.- A Data Miner's Approach to Country Corruption Analysis.- Access Control, Infrastructure Protection and Privacy.- Protecting Private Information in Online Social Networks.- Protection of Database Security Via Collaborative Inference Detection.- Suspect Vehicle Identification for Border Safety.- Optimization Problems for Port-of-Entry Detection Systems.- Modeling and Validation of Aviation Security.- Surveillance and Emergency Response.- Anomaly Detection in Moving Object.- Intelligent Face Recognition.- Video Analysis of Vehicles and Persons for Surveillance.- Video-Based Deception Detection.

Full Papers.- Aligning Simulation Models of Smallpox Outbreaks.- Data Analytics for Bioterrorism Surveillance.- West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics.- A Novel Policy and Information Flow Security Model for Active Network.- A Novel Autonomous Trust Management Model for Mobile Agents.- Privacy-Preserving Inter-database Operations.- Finding Unusual Correlation Using Matrix Decompositions.- Generating Concept Hierarchies from Text for Intelligence Analysis.- Interactive Query Languages for Intelligence Tasks.- Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism.- The Architecture of the Cornell Knowledge Broker.- Computer-Based Training for Deception Detection: What Users Want?.- Identifying Multi-ID Users in Open Forums.- Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training.- Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.- Critical Infrastructure Integration Modeling and Simulation.- Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection.- The Optimal Deployment of Filters to Limit Forged Address Attacks in Communication Networks.- A Tool for Internet Chatroom Surveillance.- ChatTrack: Chat Room Topic Detection Using Classification.- SECRETS: A Secure Real-Time Multimedia Surveillance System.- Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information.- THEMIS: Threat Evaluation Metamodel for Information Systems.- Balancing Security and Privacy in the 21 st Century.- IT Security Risk Management under Network Effects and Layered Protection Strategy.- Mind the Gap: The Growing Distance between Institutional and Technical Capabilities in Organizations Performing Critical Operations.- Analyzing and Visualizing Criminal Network Dynamics: A Case Study.- Discovering Hidden Groups in Communication Networks.- Generating Networks of Illegal Drug Users Using Large Samples of Partial Ego-Network Data.- Short Papers.- Using Speech Act Profiling for Deception Detection.- Testing Various Modes of Computer-Based Training for Deception Detection.- The Use of Data Mining Techniques in Operational Crime Fighting.- Spatial Forecast Methods for Terrorist Events in Urban Environments.- Web-Based Intelligence Notification System: Architecture and Design.- Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network.- Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data.- Information Sharing and Collaboration Policies within Government Agencies.- Intrusion-Tolerant Intrusion Detection System.- Optimal Redundancy Allocation for Disaster Recovery Planning in the Network Economy.- Semantic Analysis for Monitoring Insider Threats.- Towards a Social Network Approach for Monitoring Insider Threats to Information Security.- Extended Abstracts for Posters.- Policy-Based Information Sharing with Semantics.- Determining the Gender of the Unseen Name through Hyphenation.- A Framework for a Secure Federated Patient Healthcare System.- Vulnerability Analysis and Evaluation within an Intranet.- Security Informatics: A Paradigm Shift in Information Technology Education.- Research of Characteristics of Worm Traffic.- Panel Discussion Papers.- MIPT: Sharing Terrorism Information Resources.- Post-9/11 Evolution of Al Qaeda.- Utilizing the Social and Behavioral Sciences to Assess, Model, Forecast and Preemptively Respond to Terrorism.