Skip to main content
  • Conference proceedings
  • © 2006

Intelligence and Security Informatics

IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006.

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3975)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): ISI: International Conference on Intelligence and Security Informatics

Conference proceedings info: ISI 2006.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (125 papers)

  1. Front Matter

  2. Long Papers

    1. Intelligence Analysis and Knowledge Discovery

      1. Towards Automatic Event Tracking
        • Clive Best, Bruno Pouliquen, Ralf Steinberger, Erik Van der Goot, Ken Blackler, Flavio Fuart et al.
        Pages 26-34
      2. Semantic Analytics Visualization
        • Leonidas Deligiannidis, Amit P. Sheth, Boanerges Aleman-Meza
        Pages 48-59
      3. Visualizing Authorship for Identification
        • Ahmed Abbasi, Hsinchun Chen
        Pages 60-71
      4. A Dictionary-Based Approach to Fast and Accurate Name Matching in Large Law Enforcement Databases
        • Olcay Kursun, Anna Koufakou, Bing Chen, Michael Georgiopoulos, Kenneth M. Reynolds, Ron Eaglin
        Pages 72-82
      5. Analyzing Entities and Topics in News Articles Using Statistical Topic Models
        • David Newman, Chaitanya Chemudugunta, Padhraic Smyth, Mark Steyvers
        Pages 93-104
    2. Access Control, Privacy, and Cyber Trust

      1. Design and Implementation of a Policy-Based Privacy Authorization System
        • HyangChang Choi, SeungYong Lee, HyungHyo Lee
        Pages 129-140
      2. Privacy Preserving <i>DBSCAN</i> for Vertically Partitioned Data
        • Artak Amirbekyan, V. Estivill-Castro
        Pages 141-153
      3. Inferring Privacy Information from Social Networks
        • Jianming He, Wesley W. Chu, Zhenyu (Victor) Liu
        Pages 154-165
    3. Surveillance and Emergency Response

      1. Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
        • Xiaolei Li, Jiawei Han, Sangkyum Kim
        Pages 166-177
      2. Adaptive Method for Monitoring Network and Early Detection of Internet Worms
        • Chen Bo, Bin Xing Fang, Xiao Chun Yun
        Pages 178-189
      3. Measures to Detect Word Substitution in Intercepted Communication
        • SzeWang Fong, David B. Skillicorn, D. Roussinov
        Pages 190-200
      4. Finding Hidden Group Structure in a Stream of Communications
        • J. Baumes, M. Goldberg, M. Hayvanovych, M. Magdon-Ismail, W. Wallace, M. Zaki
        Pages 201-212
      5. Collective Sampling and Analysis of High Order Tensors for Chatroom Communications
        • Evrim Acar, Seyit A. Çamtepe, Bülent Yener
        Pages 213-224

Other Volumes

  1. Intelligence and Security Informatics

About this book

In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development and use of advanced information te- nologies and systems for national and international security-related applications, has experienced tremendous growth and attracted substantial interest from academic - searchers in related fields as well as practitioners from both government agencies and industry. The ISI community is maturing, and a core set of research methodologies and technical approaches has emerged and is becoming the underpinning of ISI research. The first two meetings (ISI 2003 and ISI 2004) in the ISI symposium and conf- ence series were held in Tucson, Arizona. With sponsorship by the IEEE Intelligent Transportation Systems Society, ISI 2005 was held in Atlanta, Georgia. Building on the momentum of these ISI meetings, we held ISI 2006 in San Diego, California, in May 2006. In addition to the established and emerging ISI technical research topics, ISI 2006 included a track on terrorism informatics, which is a new stream of terrorism research leveraging the latest advances in social science methodologies, and infor- tion technologies and tools.

Editors and Affiliations

  • School of Information and Computer Science, University of California, Irvine

    Sharad Mehrotra

  • MIS Department, University of Arizona, Tucson, USA

    Daniel D. Zeng

  • Department of Management Information Systems, Eller College of Management, The University of Arizona, USA

    Hsinchun Chen

  • University of Texas at Dallas,  

    Bhavani Thuraisingham

  • Chinese Academy of Sciences, Beijing, China

    Fei-Yue Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access