Skip to main content
  • Conference proceedings
  • © 2008

Intelligence and Security Informatics

IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5075)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): ISI: International Conference on Intelligence and Security Informatics

Conference proceedings info: ISI 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (56 papers)

  1. Front Matter

  2. Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008)

    1. Information Retrieval and Event Detection

      1. Chinese Word Segmentation for Terrorism-Related Contents
        • Daniel Zeng, Donghua Wei, Michael Chau, Feiyue Wang
        Pages 1-13
    2. Internet Security and Cybercrime

      1. Method for Evaluating the Security Risk of a Website Against Phishing Attacks
        • Young-Gab Kim, Sanghyun Cho, Jun-Sub Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim
        Pages 21-31
      2. CyberIR – A Technological Approach to Fight Cybercrime
        • Shihchieh Chou, Weiping Chang
        Pages 32-43
    3. Currency and Data Protection

      1. The Banknote Anti-forgery System Based on Digital Signature Algorithms
        • Shenghui Su, Yongquan Cai, Changxiang Shen
        Pages 44-49
      2. Data Protection in Memory Using Byte Reordering
        • Hyun Jun Jang, Dae Won Hwang, Eul Gyu Im
        Pages 62-68
    4. Image and Video Analysis

      1. Attacks on SVD-Based Watermarking Schemes
        • Huo-Chong Ling, Raphael C. -W. Phan, Swee-Huay Heng
        Pages 83-91
      2. Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine
        • Chan-Yun Yang, Wei-Wen Tseng, Jr-Syu Yang
        Pages 102-113
    5. Privacy Issues

      1. Privacy-Preserving Collaborative Social Networks
        • Justin Zhan, Gary Blosser, Chris Yang, Lisa Singh
        Pages 114-125
      2. Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy
        • Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang
        Pages 126-137
    6. Social Networks

      1. Comparing Two Models for Terrorist Group Detection: GDM or OGDM?
        • Fatih Ozgul, Zeki Erdem, Hakan Aksoy
        Pages 149-160
    7. Modeling and Visualization

      1. Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
        • Luigi Ferrara, Christian MÃ¥rtenson, Pontus Svenson, Per Svensson, Justo Hidalgo, Anastasio Molano et al.
        Pages 171-182
      2. Visual Analytics for Supporting Entity Relationship Discovery on Text Data
        • Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, Hweehwa Pang
        Pages 183-194

Other Volumes

  1. Intelligence and Security Informatics

About this book

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008.

The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.

Editors and Affiliations

  • The Chinese University of Hong Kong, Hong Kong

    Christopher C. Yang

  • The University of Arizona, USA

    Hsinchun Chen

  • The University of Hong Kong, Hong Kong

    Michael Chau

  • Nanyang Technological University, Singapore

    Kuiyu Chang

  • University of Central Florida, USA

    Sheau-Dong Lang

  • Tatung University, Taiwan

    Patrick S. Chen

  • California University of Pennsylvania, USA

    Raymond Hsieh

  • University of Arizona and Chinese Academy of Sciences, USA

    Daniel Zeng

  • Chinese Academy of Sciences, China

    Fei-Yue Wang, Wenji Mao

  • Carnegie Mellon University, USA

    Kathleen Carley, Justin Zhan

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access